Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1tZzQ2LWY5aDUtZzI3eM4AAywe

Apache Sling Engine vulnerable to cross-site scripting (XSS) that can lead to privilege escalation

The SlingRequestDispatcher doesn't correctly implement the RequestDispatcher API resulting in a generic type of include-based cross-site scripting issues on the Apache Sling level. The vulnerability is exploitable by an attacker that is able to include a resource with specific content-type and control the include path (i.e. writing content). The impact of a successful attack is privilege escalation to administrative power.

Please update to Apache Sling Engine version 2.14.0 or newer and enable the "Check Content-Type overrides" configuration option.

Permalink: https://github.com/advisories/GHSA-mg46-f9h5-g27x
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tZzQ2LWY5aDUtZzI3eM4AAywe
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: about 1 year ago


CVSS Score: 8.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

Identifiers: GHSA-mg46-f9h5-g27x, CVE-2022-45064
References: Blast Radius: 16.9

Affected Packages

maven:org.apache.sling:org.apache.sling.engine
Dependent packages: 67
Dependent repositories: 122
Downloads:
Affected Version Ranges: < 2.14.0
Fixed in: 2.14.0
All affected versions: 2.0.6, 2.1.0, 2.2.0, 2.2.2, 2.2.4, 2.2.6, 2.2.8, 2.2.10, 2.3.0, 2.3.2, 2.3.4, 2.3.6, 2.3.8, 2.3.10, 2.4.0, 2.4.2, 2.4.4, 2.4.6, 2.5.0, 2.6.0, 2.6.2, 2.6.4, 2.6.6, 2.6.8, 2.6.10, 2.6.12, 2.6.14, 2.6.16, 2.6.18, 2.6.20, 2.6.22, 2.7.2, 2.7.4, 2.7.6, 2.7.8, 2.7.10, 2.8.0, 2.9.0, 2.9.2, 2.10.2, 2.11.0, 2.12.0, 2.12.2, 2.13.0
All unaffected versions: 2.14.0, 2.15.0, 2.15.2, 2.15.4, 2.15.6, 2.15.8, 2.15.10