Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAEWfVJmF52fMY8wYZ-35ic7=T1dnmSArDZuC3oydUJBqSugsGA@mail.gmail.com>
Date: Mon, 8 Jan 2018 15:04:28 +0100
From: Bertrand Delacretaz <bdelacretaz@...che.org>
To: dev <dev@...ng.apache.org>
Cc: users <users@...ng.apache.org>, 
	"security@...ng.apache.org" <security@...ng.apache.org>, oss-security@...ts.openwall.com, 
	bugtraq@...urityfocus.com
Subject: CVE-2012-3353: Apache Sling Content Loading Vulnerability

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Sling  JCR ContentLoader 2.1.4

Description:
The Apache Sling JCR ContentLoader 2.1.4 XmlReader
used in the Sling JCR content loader module makes it
possible to import arbitrary files in the content repository,
including local files, causing potential information leaks.

Mitigation:
Users should upgrade to version 2.1.6 of the JCR ContentLoader

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.