Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <0f893b63-0431-2fbb-37bc-9d63a174ef88@apache.org>
Date: Mon, 15 May 2023 08:34:46 +0000
From: Robert Munteanu <rombert@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2022-47937: Multiple parsing problems in the Apache Sling
 Commons JSON module 

Severity: moderate

Affected versions:

- org.apache.sling.commons.json through 2.0.20

Description:

** UNSUPPORTED WHEN ASSIGNED ** 





Improper input validation in the Apache Sling Commons JSON bundle allows an attacker to trigger unexpected errors by supplying specially-crafted input.




NOTE: This vulnerability 
only affects products that are no longer supported by the maintainer




The org.apache.sling.commons.json bundle has been deprecated as of March
 2017 and should not be used anymore. Consumers are encouraged to 
consider the Apache Sling Commons Johnzon OSGi bundle provided by the 
Apache Sling project, but may of course use other JSON libraries.

Credit:

The vulnerability was discovered and reported by BIngDiAn. (finder)

References:

https://issues.apache.org/jira/browse/SLING-6536
https://github.com/apache/sling-org-apache-sling-commons-johnzon
https://sling.apache.org/
https://www.cve.org/CVERecord?id=CVE-2022-47937

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.