Path Traversal Vulnerability in Apache Tapestry on Windows Platforms
CVE-2019-0207

7.5HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
16 September 2019

Summary

Apache Tapestry is vulnerable to a path traversal attack due to improper filtering of the backslash character in the asset handling process. This flaw allows an attacker to exploit the asset processing functionality, enabling unauthorized access to files on Windows systems. By crafting specific requests, attackers can traverse the directory structure and potentially read sensitive files, posing a severe security risk.

Affected Version(s)

Apache Tapestry Apache Tapestry 5.4.0 to 5.4.4

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.