CVE-2024-23673

HIGH

Apache Sling Servlets Resolver < 2.11.0 - Path Traversal

Title source: rule

Description

Malicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system. If the system is vulnerable, a user with write access to the repository might be able to trick the Sling Servlet Resolver to load a previously uploaded script.  Users are recommended to upgrade to version 2.11.0, which fixes this issue. It is recommended to upgrade, regardless of whether your system configuration currently allows this attack or not.

Exploits (1)

nomisec WRITEUP
by shoucheng3 · poc
https://github.com/shoucheng3/apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2-10-0

Scores

CVSS v3 8.5
EPSS 0.0025
EPSS Percentile 48.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Classification

CWE
CWE-22
Status published

Affected Products (2)

apache/sling_servlets_resolver < 2.11.0
org.apache.sling/org.apache.sling.servlets.resolver < 2.11.0Maven

Timeline

Published Feb 06, 2024
Tracked Since Feb 18, 2026