Maven package
org.apache.tapestry/tapestry-core
pkg:maven/org.apache.tapestry/tapestry-core
Vulnerabilities (9)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-46366 | — | >= 3.0, < 5.0.1 | 5.0.1 | Dec 2, 2022 | Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line | ||
| CVE-2022-31781 | — | < 5.8.2 | 5.8.2 | Jul 13, 2022 | Apache Tapestry up to version 5.8.1 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles Content Types. Specially crafted Content Types may cause catastrophic backtracking, taking exponential time to complete. Specifically, this is about the regular | ||
| CVE-2021-30638 | — | >= 5.4.0, < 5.6.4 | 5.6.4 | Apr 27, 2021 | Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5. | ||
| CVE-2021-27850 | — | >= 5.4.0, < 5.6.3 | 5.6.3 | Apr 15, 2021 | A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019 | ||
| CVE-2020-13953 | — | >= 5.4.0, < 5.6.0 | 5.6.0 | Sep 30, 2020 | In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run. | ||
| CVE-2019-10071 | — | >= 5.4, < 5.4.5 | 5.4.5 | Sep 16, 2019 | The code which checks HMAC in form submissions used String.equals() for comparisons, which results in a timing side channel for the comparison of the HMAC signatures. This could lead to remote code execution if an attacker is able to determine the correct signature for their payl | ||
| CVE-2019-0207 | — | >= 5.4.0, < 5.4.5 | 5.4.5 | Sep 16, 2019 | Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform. | ||
| CVE-2019-0195 | — | >= 5.4.0, < 5.4.5 | 5.4.5 | Sep 16, 2019 | Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the webapp's AppModule class, the va | ||
| CVE-2014-1972 | — | < 5.3.6 | 5.3.6 | Aug 22, 2015 | Apache Tapestry before 5.3.6 relies on client-side object storage without checking whether a client has modified an object, which allows remote attackers to cause a denial of service (resource consumption) or execute arbitrary code via crafted serialized data. |
- CVE-2022-46366Dec 2, 2022affected >= 3.0, < 5.0.1fixed 5.0.1
Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line
- CVE-2022-31781Jul 13, 2022affected < 5.8.2fixed 5.8.2
Apache Tapestry up to version 5.8.1 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles Content Types. Specially crafted Content Types may cause catastrophic backtracking, taking exponential time to complete. Specifically, this is about the regular
- CVE-2021-30638Apr 27, 2021affected >= 5.4.0, < 5.6.4fixed 5.6.4
Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.
- CVE-2021-27850Apr 15, 2021affected >= 5.4.0, < 5.6.3fixed 5.6.3
A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019
- CVE-2020-13953Sep 30, 2020affected >= 5.4.0, < 5.6.0fixed 5.6.0
In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run.
- CVE-2019-10071Sep 16, 2019affected >= 5.4, < 5.4.5fixed 5.4.5
The code which checks HMAC in form submissions used String.equals() for comparisons, which results in a timing side channel for the comparison of the HMAC signatures. This could lead to remote code execution if an attacker is able to determine the correct signature for their payl
- CVE-2019-0207Sep 16, 2019affected >= 5.4.0, < 5.4.5fixed 5.4.5
Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.
- CVE-2019-0195Sep 16, 2019affected >= 5.4.0, < 5.4.5fixed 5.4.5
Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the webapp's AppModule class, the va
- CVE-2014-1972Aug 22, 2015affected < 5.3.6fixed 5.3.6
Apache Tapestry before 5.3.6 relies on client-side object storage without checking whether a client has modified an object, which allows remote attackers to cause a denial of service (resource consumption) or execute arbitrary code via crafted serialized data.