Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-46366

Опубликовано: 02 дек. 2022
Источник: redhat
CVSS3: 7.6

Описание

Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Migration Toolkit for Applications 6TapestryNot affected
Migration Toolkit for RuntimesTapestryNot affected
Red Hat Decision Manager 7TapestryNot affected
Red Hat Fuse 7TapestryNot affected
Red Hat JBoss Data Grid 7TapestryNot affected
Red Hat JBoss Enterprise Application Platform 7TapestryNot affected
Red Hat JBoss Enterprise Application Platform Expansion PackTapestryNot affected
Red Hat Process Automation 7TapestryNot affected
Red Hat Single Sign-On 7TapestryNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=2150937Tapestry: prior to version 4 (EOL) allows RCE though deserialization of untrusted input

7.6 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 3 лет назад

Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.

CVSS3: 9.8
github
около 3 лет назад

Apache Tapestry allows deserialization of untrusted data

7.6 High

CVSS3