[ 
https://issues.apache.org/jira/browse/SLING-11162?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Angela Schreiber resolved SLING-11162.
--------------------------------------
    Resolution: Incomplete

> Vulnerabilities stopping us from procuring these libs
> -----------------------------------------------------
>
>                 Key: SLING-11162
>                 URL: https://issues.apache.org/jira/browse/SLING-11162
>             Project: Sling
>          Issue Type: Bug
>          Components: XSS Protection API
>            Reporter: Mahidhar Chaluvadi
>            Priority: Major
>
> Today we wanted to use latest version of WCM IO Mocks for AEM JUnit Testing, 
> and our organization denied our request stating there are vulnerabilities in 
> the dependency chain, and here are the details. Wondering if there is a way 
> to revise the version including necessary fixes. We are okay to contribute 
> back to the respective git repo with the required guidance so we dont violate 
> any standards you may have.
>   Dependency: MAVEN - 
> org.apache.sling:org.apache.sling.resourcebuilder:1.0.4:jar
>       RejectReasons (2)
>         RejectReason:   2057e68c-41f8-4f57-80fe-54278d93e422
>           Type:            VULNERABILITY
>           Name:            CVE-2016-0956
>           CVSS Score v2:   7.8
>           Severity:        high
>           Description:     The Servlets Post component 2.3.6 in Apache Sling, 
> as used in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0, allows remote 
> attackers to obtain sensitive information via unspecified vectors.
>         RejectReason:   51205845-93e2-4d67-8289-afe4ee35cd65
>           Type:            VULNERABILITY
>           Name:            CVE-2016-6798
>           CVSS Score v2:   7.5
>           Severity:        high
>           Description:     In the XSS Protection API module before 1.0.12 in 
> Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to 
> validate the input string, which allows for XXE attacks in all scripts which 
> use this method to validate user input, potentially allowing an attacker to 
> read sensitive data on the filesystem, perform same-site-request-forgery 
> (SSRF), port-scanning behind the firewall or DoS the application.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to