Apache Tapestry vulnerabilities
10 known vulnerabilities affecting apache/tapestry.
Total CVEs
10
CISA KEV
0
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL5HIGH4MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2022-46366CRITICALCVSS 9.8≥ 3.0.0, < 4.0.02022-12-02
CVE-2022-46366 [CRITICAL] CVE-2022-46366: Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This
Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended t
nvd
CVE-2022-31781HIGHCVSS 7.5fixed in 5.8.22022-07-13
CVE-2022-31781 [HIGH] CWE-1333 CVE-2022-31781: Apache Tapestry up to version 5.8.1 is vulnerable to Regular Expression Denial of Service (ReDoS) in
Apache Tapestry up to version 5.8.1 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles Content Types. Specially crafted Content Types may cause catastrophic backtracking, taking exponential time to complete. Specifically, this is about the regular expression used on the parameter of the org.apache.tapestry5.http.Conte
nvd
CVE-2021-30638HIGHCVSS 7.5≥ 5.4.0, < 5.6.4≥ 5.7.0, < 5.7.22021-04-27
CVE-2021-30638 [HIGH] CVE-2021-30638: Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker t
Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Apache Tapestry 5.7.0 version and Apache Ta
nvd
CVE-2021-27850CRITICALCVSS 9.8ExploitedPoC≥ 5.4.0, < 5.6.2≥ 5.7.0, < 5.7.12021-04-15
CVE-2021-27850 [CRITICAL] CVE-2021-27850: A critical unauthenticated remote code execution vulnerability was found all recent versions of Apac
A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by
nvd
CVE-2020-17531CRITICALCVSS 9.8≥ 4.0.0, < 5.0.12020-12-08
CVE-2020-17531 [CRITICAL] CWE-502 CVE-2020-17531: A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to
A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5
nvd
CVE-2020-13953MEDIUMCVSS 5.3≥ 5.4.0, < 5.6.4≥ 5.7.0, < 5.7.22020-09-30
CVE-2020-13953 [MEDIUM] CWE-552 CVE-2020-13953: In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files insid
In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run.
nvd
CVE-2019-10071CRITICALCVSS 9.8≥ 5.4.0, ≤ 5.4.32019-09-16
CVE-2019-10071 [CRITICAL] CWE-203 CVE-2019-10071: The code which checks HMAC in form submissions used String.equals() for comparisons, which results i
The code which checks HMAC in form submissions used String.equals() for comparisons, which results in a timing side channel for the comparison of the HMAC signatures. This could lead to remote code execution if an attacker is able to determine the correct signature for their payload. The comparison should be done with a constant time algorithm ins
nvd
CVE-2019-0195CRITICALCVSS 9.8≥ 5.4.0, ≤ 5.4.32019-09-16
CVE-2019-0195 [CRITICAL] CWE-502 CVE-2019-0195: Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the clas
Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the webapp's AppModule class, the value of this symbol could be used to craft a Java deserialization attack
nvd
CVE-2019-0207HIGHCVSS 7.5≥ 5.4.0, ≤ 5.4.42019-09-16
CVE-2019-0207 [HIGH] CWE-22 CVE-2019-0207: Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher ->
Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.
nvd
CVE-2014-1972HIGHCVSS 7.8≤ 5.3.52015-08-22
CVE-2014-1972 [HIGH] CWE-399 CVE-2014-1972: Apache Tapestry before 5.3.6 relies on client-side object storage without checking whether a client
Apache Tapestry before 5.3.6 relies on client-side object storage without checking whether a client has modified an object, which allows remote attackers to cause a denial of service (resource consumption) or execute arbitrary code via crafted serialized data.
nvd