2 results (0.001 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

The Javascript method Sling.evalString() in Apache Sling Servlets Post before 2.3.22 uses the javascript 'eval' function to parse input strings, which allows for XSS attacks by passing specially crafted input strings. El método Javascript method Sling.evalString() en Apache Sling Servlets Post en versiones anteriores a la 2.3.22 emplea la función javascript ‘eval’ para parsear cadenas de entrada, lo que permite la ejecución de ataques XSS pasando cadenas de entrada especialmente manipuladas. • http://packetstormsecurity.com/files/143758/Apache-Sling-Servlets-Post-2.3.20-Cross-Site-Scripting.html http://www.securityfocus.com/archive/1/541024/100/0/threaded http://www.securityfocus.com/bid/100284 https://issues.apache.org/jira/browse/SLING-7041 https://lists.apache.org/thread.html/2f4b8333e44c6e7e0b00933bd4204ce64829952f60dbb6814f2cdf91%40%3Cdev.sling.apache.org%3E • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in Apache Sling API before 2.2.2 and Apache Sling Servlets Post before 2.1.2 allow remote attackers to inject arbitrary web script or HTML via the URI, related to (1) org/apache/sling/api/servlets/HtmlResponse and (2) org/apache/sling/servlets/post/HtmlResponse. Múltiples vulnerabilidades de XSS en Apache Sling API anterior a 2.2.2 y Apache Sling Servlets Post anterior a 2.1.2 permiten a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a través de la URI, relacionado con (1) org/apache/sling/api/servlets/HtmlResponse y (2) org/apache/sling/servlets/post/HtmlResponse. • http://jvn.jp/en/jp/JVN61328139/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2015-000069 http://www.securityfocus.com/bid/74839 https://issues.apache.org/jira/browse/SLING-2082 https://lists.apache.org/thread.html/r04237d561f3e5bced0a26287454450a34275162aa6b1dbae1b707b31%40%3Cdev.sling.apache.org%3E https://lists.apache.org/thread.html/r4f41dd891a52133abdbf7f74ad1dde80c46f157c1f1cf8c23ba60a70%40%3Cdev.sling.apache.org%3E https://lists.apache.org/thread.html/r93d68359eb0ea8c0f26d71ca3998143f99209a24db7b4dacfc688cea%40%3Cdev.sling.apache.org&# • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •