CVE-2019-0207
16.09.2019, 17:15
Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.
Vendor | Product | Version |
---|---|---|
apache | tapestry | 5.4.0 ≤ 𝑥 ≤ 5.4.4 |
𝑥
= Vulnerable software versions
References