- Added submission from Apache Sling from 2018-01-08.

This commit is contained in:
CVE Team 2018-01-08 15:09:14 -05:00
parent 78a5ad1b5c
commit 7db4c1e0b9
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56

View File

@ -1,8 +1,32 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER" : "security@apache.org",
"DATE_PUBLIC" : "2017-05-09T00:00:00",
"ID" : "CVE-2012-3353",
"STATE" : "RESERVED"
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Sling",
"version" : {
"version_data" : [
{
"version_value" : "JCR ContentLoader 2.1.4"
}
]
}
}
]
},
"vendor_name" : "Apache Software Foundation"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +35,26 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "The Apache Sling JCR ContentLoader 2.1.4 XmlReader used in the Sling JCR content loader module makes it possible to import arbitrary files in the content repository, including local files, causing potential information leaks. Mitigation: Users should upgrade to version 2.1.6 of the JCR ContentLoader"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Content Loading Vulnerability"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://issues.apache.org/jira/browse/SLING-2512"
}
]
}