{"api_version":"1","generated_at":"2026-04-23T04:21:34+00:00","cve":"CVE-2022-47937","urls":{"html":"https://cve.report/CVE-2022-47937","api":"https://cve.report/api/cve/CVE-2022-47937.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-47937","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-47937"},"summary":{"title":"CVE-2022-47937","description":"** UNSUPPORTED WHEN ASSIGNED ** \n\n\n\n\n\nImproper input validation in the Apache Sling Commons JSON bundle allows an attacker to trigger unexpected errors by supplying specially-crafted input.\n\n\n\n\nNOTE: This vulnerability \nonly affects products that are no longer supported by the maintainer\n\n\n\n\nThe org.apache.sling.commons.json bundle has been deprecated as of March\n 2017 and should not be used anymore. Consumers are encouraged to \nconsider the Apache Sling Commons Johnzon OSGi bundle provided by the \nApache Sling project, but may of course use other JSON libraries.","state":"PUBLIC","assigner":"security@apache.org","published_at":"2023-05-15 10:15:00","updated_at":"2024-03-29 10:15:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"http://www.openwall.com/lists/oss-security/2023/05/15/2","name":"http://www.openwall.com/lists/oss-security/2023/05/15/2","refsource":"MISC","tags":[],"title":"oss-security - CVE-2022-47937: Multiple parsing problems in the Apache Sling\n Commons JSON module","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/apache/sling-org-apache-sling-commons-johnzon","name":"https://github.com/apache/sling-org-apache-sling-commons-johnzon","refsource":"MISC","tags":[],"title":"GitHub - apache/sling-org-apache-sling-commons-johnzon: Apache Sling Commons Johnzon Wrapper Library","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://issues.apache.org/jira/browse/SLING-6536","name":"https://issues.apache.org/jira/browse/SLING-6536","refsource":"MISC","tags":[],"title":"[SLING-6536] Deprecate JSON implementation derived from org.json code - ASF JIRA","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.openwall.com/lists/oss-security/2023/05/15/2","name":"https://www.openwall.com/lists/oss-security/2023/05/15/2","refsource":"","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.apache.org/thread/sws7z50x47gv0c38q4kx6ktqrvrrg1pm","name":"https://lists.apache.org/thread/sws7z50x47gv0c38q4kx6ktqrvrrg1pm","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-47937","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-47937","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"47937","vulnerable":"1","versionEndIncluding":"2.0.20","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"sling_commons_json","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-47937","ASSIGNER":"security@apache.org","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"** UNSUPPORTED WHEN ASSIGNED ** \n\n\n\n\n\nImproper input validation in the Apache Sling Commons JSON bundle allows an attacker to trigger unexpected errors by supplying specially-crafted input.\n\n\n\n\nNOTE: This vulnerability \nonly affects products that are no longer supported by the maintainer\n\n\n\n\nThe org.apache.sling.commons.json bundle has been deprecated as of March\n 2017 and should not be used anymore. Consumers are encouraged to \nconsider the Apache Sling Commons Johnzon OSGi bundle provided by the \nApache Sling project, but may of course use other JSON libraries.\n\n\n\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apache Software Foundation","product":{"product_data":[{"product_name":"org.apache.sling.commons.json","version":{"version_data":[{"version_affected":"<=","version_name":"0","version_value":"2.0.20"}]}}]}}]}},"references":{"reference_data":[{"url":"https://issues.apache.org/jira/browse/SLING-6536","refsource":"MISC","name":"https://issues.apache.org/jira/browse/SLING-6536"},{"url":"https://github.com/apache/sling-org-apache-sling-commons-johnzon","refsource":"MISC","name":"https://github.com/apache/sling-org-apache-sling-commons-johnzon"},{"url":"https://lists.apache.org/thread/sws7z50x47gv0c38q4kx6ktqrvrrg1pm","refsource":"MISC","name":"https://lists.apache.org/thread/sws7z50x47gv0c38q4kx6ktqrvrrg1pm"},{"url":"http://www.openwall.com/lists/oss-security/2023/05/15/2","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2023/05/15/2"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"The vulnerability was discovered and reported by BIngDiAn."}]},"nvd":{"publishedDate":"2023-05-15 10:15:00","lastModifiedDate":"2024-03-29 10:15:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:sling_commons_json:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0.20","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}