668
VMScore

CVE-2019-0195

Published: 16/09/2019 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the webapp's AppModule class, the value of this symbol could be used to craft a Java deserialization attack, thus running malicious injected Java code. The vector would be the t:formdata parameter from the Form component.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tapestry

Mailing Lists

Description: A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry The affected versions include 545, 550, 562 and 570 The vulnerability I have found is a bypass of the fix for CVE-2019-0195 Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class ...
CVE-2019-0195: File reading Leads Java Deserialization Vulnerability Severity: important Vendor: The Apache Software Foundation Versions affected: all Apache Tapestry versions between 540, including its betas, and 543 Description: Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have ...