Loading HuntDB...

GHSA-h2rq-qhr7-53gm

GitHub Security Advisory

Apache Sling Servlets Resolver executes malicious code via path traversal

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Malicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system.
If the system is vulnerable, a user with write access to the repository might be able to trick the Sling Servlet Resolver to load a previously uploaded script. 

Users are recommended to upgrade to version 2.11.0, which fixes this issue. It is recommended to upgrade, regardless of whether your system configuration currently allows this attack or not.

Affected Packages

Maven org.apache.sling:org.apache.sling.servlets.resolver
Affected versions: 0 (fixed in 2.11.0)

Related CVEs

Key Information

GHSA ID
GHSA-h2rq-qhr7-53gm
Published
February 6, 2024 12:30 PM
Last Modified
February 13, 2025 7:31 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.apache.sling:org.apache.sling.servlets.resolver
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 27, 2025 6:35 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.