Lucene search

K
ApacheTapestry5.4.0

6 matches found

CVE
CVE
added 2021/04/15 8:15 a.m.218 views

CVE-2021-27850

A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possib...

10CVSS9.8AI score0.94219EPSS
In wildWeb
CVE
CVE
added 2019/09/16 4:15 p.m.186 views

CVE-2019-0195

Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the webapp's AppModule class, the value of this symbol ...

9.8CVSS9.1AI score0.06432EPSS
In wild
CVE
CVE
added 2019/09/16 6:15 p.m.154 views

CVE-2019-10071

The code which checks HMAC in form submissions used String.equals() for comparisons, which results in a timing side channel for the comparison of the HMAC signatures. This could lead to remote code execution if an attacker is able to determine the correct signature for their payload. The comparison...

9.8CVSS9.6AI score0.07332EPSS
CVE
CVE
added 2019/09/16 5:15 p.m.99 views

CVE-2019-0207

Tapestry processes assets /assets/ctx using classes chain StaticFilesFilter -> AssetDispatcher -> ContextResource, which doesn't filter the character \, so attacker can perform a path traversal attack to read any files on Windows platform.

7.5CVSS7.3AI score0.01368EPSS
Web
CVE
CVE
added 2021/04/27 7:15 p.m.83 views

CVE-2021-30638

Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apac...

7.5CVSS6.1AI score0.05311EPSS
CVE
CVE
added 2020/09/30 6:15 p.m.71 views

CVE-2020-13953

In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run.

5.3CVSS5.9AI score0.01797EPSS