CVE-2023-25621

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-25621
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-25621.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-25621
Aliases
Withdrawn
2024-09-03T04:41:24.212348Z
Published
2023-02-23T09:15:10Z
Modified
2024-09-03T04:25:00.930182Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Privilege Escalation vulnerability in Apache Software Foundation Apache Sling. Any content author is able to create i18n dictionaries in the repository in a location the author has write access to. As these translations are used across the whole product, it allows an author to change any text or dialog in the product. For example an attacker might fool someone by changing the text on a delete button to "Info". This issue affects the i18n module of Apache Sling up to version 2.5.18. Version 2.6.2 and higher limit by default i18m dictionaries to certain paths in the repository (/libs and /apps).

Users of the module are advised to update to version 2.6.2 or higher, check the configuration for resource loading and then adjust the access permissions for the configured path accordingly.

References

Affected packages

Git / github.com/apache/sling-org-apache-sling-i18n

Affected ranges

Type
GIT
Repo
https://github.com/apache/sling-org-apache-sling-i18n
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

org.*

org.apache.sling.i18n-2.5.10
org.apache.sling.i18n-2.5.12
org.apache.sling.i18n-2.5.14
org.apache.sling.i18n-2.5.16
org.apache.sling.i18n-2.5.18