Description
Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0738 | Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform. |
Github GHSA |
GHSA-89r3-rcpj-h7w6 | Path traversal attack on Windows platforms |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T17:44:15.383Z
Reserved: 2018-11-14T00:00:00.000Z
Link: CVE-2019-0207
No data.
Status : Modified
Published: 2019-09-16T17:15:13.183
Modified: 2024-11-21T04:16:29.353
Link: CVE-2019-0207
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA