Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.
References
Configurations
History
28 Feb 2023, 20:03
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3E - Mailing List, Patch | |
References | (MLIST) https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3E - Mailing List, Patch |
Information
Published : 2019-09-16 17:15
Updated : 2024-02-04 20:20
NVD link : CVE-2019-0207
Mitre link : CVE-2019-0207
CVE.ORG link : CVE-2019-0207
JSON object : View
Products Affected
apache
- tapestry
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')