Lucene search

K
ApacheTapestry

4 matches found

CVE
CVE
added 2019/09/16 4:15 p.m.159 views

CVE-2019-0195

Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the webapp's AppModule class, the value of this symbol ...

9.8CVSS9.1AI score0.15518EPSS
CVE
CVE
added 2019/09/16 6:15 p.m.153 views

CVE-2019-10071

The code which checks HMAC in form submissions used String.equals() for comparisons, which results in a timing side channel for the comparison of the HMAC signatures. This could lead to remote code execution if an attacker is able to determine the correct signature for their payload. The comparison...

9.8CVSS9.6AI score0.09816EPSS
CVE
CVE
added 2022/12/02 2:15 p.m.77 views

CVE-2022-46366

Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no l...

9.8CVSS9.6AI score0.17506EPSS
CVE
CVE
added 2020/12/08 1:15 p.m.76 views

CVE-2020-17531

A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to addr...

9.8CVSS9.4AI score0.17506EPSS