logo

CVE-2020-17531 org.apache.tapestry:tapestry-project

Package

Manager: maven
Name: org.apache.tapestry:tapestry-project
Vulnerable Version: >=4.0 <5.0.1

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.17506 pctl0.94827

Details

Serialization vulnerability in Apache Tapestry A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version.

Metadata

Created: 2022-02-09T22:50:50Z
Modified: 2021-04-09T21:34:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-c566-2grg-mjwg/GHSA-c566-2grg-mjwg.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-c566-2grg-mjwg
Finding: F096
Auto approve: 1