Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2022-47937", "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "state": "PUBLISHED", "assignerShortName": "apache", "dateReserved": "2022-12-23T13:05:40.027Z", "datePublished": "2023-05-15T09:20:23.238Z", "dateUpdated": "2024-10-10T20:47:45.503Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "org.apache.sling.commons.json", "vendor": "Apache Software Foundation", "versions": [{"lessThanOrEqual": "2.0.20", "status": "affected", "version": "0", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "finder", "value": "The vulnerability was discovered and reported by BIngDiAn."}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<div>Improper input validation in the Apache Sling Commons JSON bundle allows an attacker to trigger unexpected errors by supplying specially-crafted input.</div><div><br><div>The org.apache.sling.commons.json bundle has been deprecated as of March\n 2017 and should not be used anymore. Consumers are encouraged to \nconsider the Apache Sling Commons Johnzon OSGi bundle provided by the \nApache Sling project, but may of course use other JSON libraries.<br></div></div>"}], "value": "Improper input validation in the Apache Sling Commons JSON bundle allows an attacker to trigger unexpected errors by supplying specially-crafted input.\n\nThe org.apache.sling.commons.json bundle has been deprecated as of March\n 2017 and should not be used anymore. Consumers are encouraged to \nconsider the Apache Sling Commons Johnzon OSGi bundle provided by the \nApache Sling project, but may of course use other JSON libraries.\n\n"}], "metrics": [{"other": {"content": {"text": "moderate"}, "type": "Textual description of severity"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache", "dateUpdated": "2024-03-29T09:39:32.611Z"}, "references": [{"tags": ["issue-tracking"], "url": "https://issues.apache.org/jira/browse/SLING-6536"}, {"tags": ["related"], "url": "https://github.com/apache/sling-org-apache-sling-commons-johnzon"}, {"tags": ["vendor-advisory"], "url": "https://lists.apache.org/thread/sws7z50x47gv0c38q4kx6ktqrvrrg1pm"}, {"url": "https://www.openwall.com/lists/oss-security/2023/05/15/2"}], "source": {"discovery": "EXTERNAL"}, "title": "Multiple parsing problems in the Apache Sling Commons JSON module", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T15:02:36.572Z"}, "title": "CVE Program Container", "references": [{"tags": ["issue-tracking", "x_transferred"], "url": "https://issues.apache.org/jira/browse/SLING-6536"}, {"tags": ["related", "x_transferred"], "url": "https://github.com/apache/sling-org-apache-sling-commons-johnzon"}, {"tags": ["vendor-advisory", "x_transferred"], "url": "https://lists.apache.org/thread/sws7z50x47gv0c38q4kx6ktqrvrrg1pm"}, {"url": "https://www.openwall.com/lists/oss-security/2023/05/15/2", "tags": ["x_transferred"]}]}, {"affected": [{"vendor": "apache", "product": "sling_commons_json", "cpes": ["cpe:2.3:a:apache:sling_commons_json:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThanOrEqual": "2.0.20", "versionType": "custom"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2024-10-10T20:45:50.606663Z", "id": "CVE-2022-47937", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-10T20:47:45.503Z"}}]}}