First published: Thu Apr 13 2023(Updated: )
The SlingRequestDispatcher doesn't correctly implement the RequestDispatcher API resulting in a generic type of include-based cross-site scripting issues on the Apache Sling level. The vulnerability is exploitable by an attacker that is able to include a resource with specific content-type and control the include path (i.e. writing content). The impact of a successful attack is privilege escalation to administrative power. Please update to Apache Sling Engine >= 2.14.0 and enable the "Check Content-Type overrides" configuration option.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Sling API | <2.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45064 is classified as a medium severity vulnerability due to the potential for cross-site scripting attacks.
To fix CVE-2022-45064, upgrade Apache Sling to version 2.14.0 or later.
CVE-2022-45064 can facilitate include-based cross-site scripting attacks.
CVE-2022-45064 affects users of Apache Sling versions prior to 2.14.0.
Yes, CVE-2022-45064 can be exploited remotely by attackers able to include malicious resources.