The Javascript method Sling.evalString() in Apache Sling Servlets Post before 2.3.22 uses the javascript 'eval' function to parse input strings, which allows for XSS attacks by passing specially crafted input strings.
References
Link | Resource |
---|---|
https://lists.apache.org/thread.html/2f4b8333e44c6e7e0b00933bd4204ce64829952f60dbb6814f2cdf91@%3Cdev.sling.apache.org%3E | Mailing List Vendor Advisory |
https://issues.apache.org/jira/browse/SLING-7041 | Issue Tracking Vendor Advisory |
http://www.securityfocus.com/bid/100284 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/143758/Apache-Sling-Servlets-Post-2.3.20-Cross-Site-Scripting.html | |
http://www.securityfocus.com/archive/1/541024/100/0/threaded |
Configurations
Information
Published : 2017-08-14 06:29
Updated : 2018-10-09 13:01
NVD link : CVE-2017-9802
Mitre link : CVE-2017-9802
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
apache
- sling_servlets_post