
Cloud Vulnerability DB
A community-led vulnerabilities database
A path traversal vulnerability was discovered in Apache Sling Servlets Resolver that could lead to malicious code execution. The vulnerability affects all versions of Apache Sling Servlets Resolver prior to version 2.11.0, and is tracked as CVE-2024-23673. The issue was publicly disclosed on February 6, 2024, and is being tracked internally as SLING-12233 (Apache Mailing List).
The vulnerability exists in the Apache Sling Servlets Resolver's handling of path traversal, which could potentially allow malicious code execution. The exact exploitation depends on the system's configuration, where a user with write access to the repository might be able to trick the Sling Servlet Resolver into loading a previously uploaded script (Apache Mailing List).
If successfully exploited, this vulnerability could allow an attacker with write access to the repository to execute malicious code through path traversal techniques. The severity of the impact depends on the specific configuration of the affected system (Apache Mailing List).
Users are strongly recommended to upgrade to Apache Sling Servlets Resolver version 2.11.0, which contains the fix for this vulnerability. This upgrade recommendation applies to all installations, regardless of whether the current system configuration allows for this attack or not (Apache Mailing List).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."