Description
Improper input validation in the Apache Sling Commons JSON bundle allows an attacker to trigger unexpected errors by supplying specially-crafted input. The org.apache.sling.commons.json bundle has been deprecated as of March 2017 and should not be used anymore. Consumers are encouraged to consider the Apache Sling Commons Johnzon OSGi bundle provided by the Apache Sling project, but may of course use other JSON libraries.
Remediation
References
https://github.com/apache/sling-org-apache-sling-commons-johnzon
https://lists.apache.org/thread/sws7z50x47gv0c38q4kx6ktqrvrrg1pm
https://issues.apache.org/jira/browse/SLING-6536
https://www.openwall.com/lists/oss-security/2023/05/15/2
Related Vulnerabilities
CVE-2022-38666 Vulnerability in maven package io.jenkins.plugins:cavisson-ns-nd-integration
CVE-2022-41238 Vulnerability in maven package com.groupon.jenkins-ci.plugins:dotci
CVE-2022-22931 Vulnerability in maven package org.apache.james:james-server
CVE-2023-36542 Vulnerability in maven package org.apache.nifi:nifi-jms-processors
CVE-2019-10402 Vulnerability in maven package org.jenkins-ci.main:jenkins-core