CVE-2019-0195
Severity
9.8CRITICAL
EPSS
15.5%
top 5.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 16
Latest updateMay 24
Description
Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the webapp's AppModule class, the value of this symbol could be used to craft a Java deserialization attack, thus running malicious injected Java code. The vector would be the t:formdata parameter from the Form component.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages4 packages
▶CVEListV5apache_software_foundation/apache_tapestryApache Tapestry 5.4.5 — Apache Tapestry 5.4.0*+3
🔴Vulnerability Details
4CVEList▶
CVE-2019-0195: Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded↗2019-09-16
💥Exploits & PoCs
1Nuclei▶
Apache Tapestry - Remote Code Execution