CVE-2016-6798 – org.apache.sling:org.apache.sling.xss.compat
Package
Manager: maven
Name: org.apache.sling:org.apache.sling.xss.compat
Vulnerable Version: >=0 <1.1.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.01343 pctl0.79275
Details
XML External Entity Reference in Apache Sling In the XSS Protection API module before 1.0.12 in Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to validate the input string, which allows for XXE attacks in all scripts which use this method to validate user input, potentially allowing an attacker to read sensitive data on the filesystem, perform same-site-request-forgery (SSRF), port-scanning behind the firewall or DoS the application.
Metadata
Created: 2022-05-17T02:26:22Z
Modified: 2022-11-03T20:48:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-7g54-vgp6-jj5w/GHSA-7g54-vgp6-jj5w.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-7g54-vgp6-jj5w
Finding: F083
Auto approve: 1