Miggo Logo

CVE-2022-46769:
Apache Sling App CMS vulnerable to reflected Cross-site Scripting

5.4

CVSS Score

Basic Information

EPSS Score
-
Published
1/9/2023
Updated
1/29/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.sling:org.apache.sling.cmsmaven< 1.1.41.1.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability specifically affects the site group feature in Apache Sling CMS, indicating input from authenticated users is reflected back without proper sanitization. Reflected XSS typically occurs when request parameters are directly embedded in responses. The SiteGroupServlet would be the logical handler for site group operations, and the doGet method is a common entry point for HTTP GET requests. While exact code isn't available, the pattern matches classic XSS vulnerabilities in Java servlets where request parameters (like group identifiers or names) are echoed in responses without using output encoding utilities like OWASP Encoder or ESAPI.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n improp*r n*utr*liz*tion o* input *urin* w** p*** **n*r*tion ('*ross-sit* S*riptin*') [*W*-**] vuln*r**ility in Slin* *pp *MS v*rsion *.*.* *n* prior m*y *llow *n *ut**nti**t** r*mot* *tt**k*r to p*r*orm * r**l**t** *ross-sit* s*riptin* (XSS) *tt**

Reasoning

T** vuln*r**ility sp**i*i**lly *****ts t** sit* *roup ***tur* in *p**** Slin* *MS, in*i**tin* input *rom *ut**nti**t** us*rs is r**l**t** ***k wit*out prop*r s*nitiz*tion. R**l**t** XSS typi**lly o**urs w**n r*qu*st p*r*m*t*rs *r* *ir**tly *m****** i