Description
Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the webapp's AppModule class, the value of this symbol could be used to craft a Java deserialization attack, thus running malicious injected Java code. The vector would be the t:formdata parameter from the Form component.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6mwh-fw4p-75fj | Deserialization of Untrusted Data in Apache Tapestry |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T17:44:15.351Z
Reserved: 2018-11-14T00:00:00.000Z
Link: CVE-2019-0195
No data.
Status : Modified
Published: 2019-09-16T16:15:10.007
Modified: 2024-11-21T04:16:27.610
Link: CVE-2019-0195
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA