Описание
A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version.
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListVendor Advisory
- Mailing ListVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListVendor Advisory
- Mailing ListVendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 4.0.0 (включая) до 5.0.1 (исключая)
cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*
EPSS
Процентиль: 97%
0.36455
Средний
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-502
CWE-502
Связанные уязвимости
EPSS
Процентиль: 97%
0.36455
Средний
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-502
CWE-502