GHSA-7g54-vgp6-jj5w

Suggest an improvement
Source
https://github.com/advisories/GHSA-7g54-vgp6-jj5w
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-7g54-vgp6-jj5w/GHSA-7g54-vgp6-jj5w.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-7g54-vgp6-jj5w
Aliases
Published
2022-05-17T02:26:22Z
Modified
2024-02-16T08:11:04.782695Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
XML External Entity Reference in Apache Sling
Details

In the XSS Protection API module before 1.0.12 in Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to validate the input string, which allows for XXE attacks in all scripts which use this method to validate user input, potentially allowing an attacker to read sensitive data on the filesystem, perform same-site-request-forgery (SSRF), port-scanning behind the firewall or DoS the application.

Database specific
{
    "nvd_published_at": "2017-07-19T15:29:00Z",
    "cwe_ids": [
        "CWE-611"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2022-11-03T20:48:21Z"
}
References

Affected packages

Maven / org.apache.sling:org.apache.sling.xss

Package

Name
org.apache.sling:org.apache.sling.xss
View open source insights on deps.dev
Purl
pkg:maven/org.apache.sling/org.apache.sling.xss

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.12

Affected versions

1.*

1.0.0
1.0.2
1.0.4
1.0.6
1.0.8

Maven / org.apache.sling:org.apache.sling.xss.compat

Package

Name
org.apache.sling:org.apache.sling.xss.compat
View open source insights on deps.dev
Purl
pkg:maven/org.apache.sling/org.apache.sling.xss.compat

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0

Affected versions

1.*

1.0.0