CVE-2019-10071: Apache Tapestry vulnerability disclosure

Related Vulnerabilities: CVE-2019-10071   CVE-2019-0207  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->

oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->

By Date

By Thread

</form>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2019-10071: Apache Tapestry vulnerability disclosure

<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->

From: "Thiago H. de Paula Figueiredo" &lt;thiagohp () gmail com&gt;

Date: Fri, 13 Sep 2019 11:40:00 -0300

<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->

<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
CVE-2019-0207: Apache Tapestry 5.4.2 Path Traversal vulnerability
Severity: important
Vendor: The Apache Software Foundation
Versions affected: all Apache Tapestry versions between 5.4.0, including
its betas, and 5.4.3.

Description: The code which checks HMAC in form submissions used
String.equals() for comparisons, which results in a timing side channel for
the comparison of the HMAC signatures. This could lead to remote code
execution if an attacker is able to determine the correct signature for
their payload. The comparison should be done with a constant time algorithm
instead.

Mitigation:
Upgrade to Tapestry 5.4.5, which is a drop-in replacement for any 5.4.x
version.

Credit:
David Tomaschik of the Google Security Team

-- 
Thiago H. de Paula Figueiredo

<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->

<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->

By Date

By Thread

Current thread:

CVE-2019-10071: Apache Tapestry vulnerability disclosure Thiago H. de Paula Figueiredo (Sep 13)

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->