The SlingRequestDispatcher doesn't correctly implement the RequestDispatcher API resulting in a generic type of include-based cross-site scripting issues on the Apache Sling level. The vulnerability is exploitable by an attacker that is able to include a resource with specific content-type and control the include path (i.e. writing content). The impact of a successful attack is privilege escalation to administrative power.
Please update to Apache Sling Engine >= 2.14.0 and enable the "Check Content-Type overrides" configuration option.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-10-17T20:31:19.485Z
Reserved: 2022-11-09T09:29:43.945Z
Link: CVE-2022-45064

Updated: 2024-08-03T14:01:31.530Z

Status : Modified
Published: 2023-04-13T11:15:06.737
Modified: 2024-11-21T07:28:42.643
Link: CVE-2022-45064

No data.