Path Traversal Vulnerability in Apache Tapestry on Windows Platforms
CVE-2019-0207
7.5HIGH
Summary
Apache Tapestry is vulnerable to a path traversal attack due to improper filtering of the backslash character in the asset handling process. This flaw allows an attacker to exploit the asset processing functionality, enabling unauthorized access to files on Windows systems. By crafting specific requests, attackers can traverse the directory structure and potentially read sensitive files, posing a severe security risk.
Affected Version(s)
Apache Tapestry Apache Tapestry 5.4.0 to 5.4.4
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved