The SlingRequestDispatcher doesn't correctly implement the RequestDispatcher API resulting in a generic type of include-based cross-site scripting issues on the Apache Sling level. The vulnerability is exploitable by an attacker that is able to include a resource with specific content-type and control the include path (i.e. writing content). The impact of a successful attack is privilege escalation to administrative power.
Please update to Apache Sling Engine >= 2.14.0 and enable the "Check Content-Type overrides" configuration option.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/04/18/6 | Mailing List |
https://lists.apache.org/thread/hhp611hltby3whk03vx2mv7cmy3vs0ok | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2023/04/18/6 | Mailing List |
https://lists.apache.org/thread/hhp611hltby3whk03vx2mv7cmy3vs0ok | Mailing List Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-04-13 11:15
Updated : 2024-11-21 07:28
NVD link : CVE-2022-45064
Mitre link : CVE-2022-45064
CVE.ORG link : CVE-2022-45064
JSON object : View
Products Affected
apache
- sling
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')