First published: Tue Feb 14 2023(Updated: )
Apache Sling JCR Base < 3.1.12 has a critical injection vulnerability when running on old JDK versions (JDK 1.8.191 or earlier) through utility functions in RepositoryAccessor. The functions getRepository and getRepositoryFromURL allow an application to access data stored in a remote location via JDNI and RMI. Users of Apache Sling JCR Base are recommended to upgrade to Apache Sling JCR Base 3.1.12 or later, or to run on a more recent JDK.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Sling | >=2.0.6<3.1.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25141 has a critical severity rating due to an injection vulnerability present in Apache Sling JCR Base.
To remediate CVE-2023-25141, upgrade Apache Sling JCR Base to version 3.1.12 or later.
CVE-2023-25141 affects Apache Sling JCR Base versions prior to 3.1.12.
CVE-2023-25141 describes a critical injection vulnerability that can be exploited through specific utility functions.
Yes, running Apache Sling JCR Base on JDK versions 1.8.191 or earlier exacerbates the vulnerability in CVE-2023-25141.