First published: Thu Oct 17 2013(Updated: )
The deepGetOrCreateNode function in impl/operations/AbstractCreateOperation.java in org.apache.sling.servlets.post.bundle 2.2.0 and 2.3.0 in Apache Sling does not properly handle a NULL value that returned when the session does not have permissions to the root node, which allows remote attackers to cause a denial of service (infinite loop) via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Org.apache.sling.servlets.post | =2.2.0 | |
Apache Org.apache.sling.servlets.post | =2.3.0 | |
Apache Sling |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2254 is considered to have a moderate severity level due to its potential impact on remote attackers gaining access to restricted areas.
To fix CVE-2013-2254, upgrade your Apache Sling Servlets Post bundle to version 2.4.0 or later, where the vulnerability is addressed.
CVE-2013-2254 affects Apache Sling Servlets Post versions 2.2.0 and 2.3.0.
CVE-2013-2254 exploits a null value handling issue that occurs when a session lacks permissions to the root node.
No, CVE-2013-2254 does not directly allow remote code execution but can lead to unauthorized access due to permission mismanagement.