7.8 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
7.9 High
AI Score
Confidence
High
0.027 Low
EPSS
Percentile
90.6%
Apache Tapestry before 5.3.6 relies on client-side object storage without checking whether a client has modified an object, which allows remote attackers to cause a denial of service (resource consumption) or execute arbitrary code via crafted serialized data.
CPE | Name | Operator | Version |
---|---|---|---|
apache:tapestry | apache tapestry | le | 5.3.5 |
jvn.jp/en/jp/JVN17611367/index.html
jvndb.jvn.jp/jvndb/JVNDB-2015-000118
seclists.org/fulldisclosure/2019/Aug/20
www.openwall.com/lists/oss-security/2019/08/23/5
issues.apache.org/jira/browse/TAP5-2008
lists.apache.org/thread.html/84e99dedad2ecb4676de93c3ab73a8a10882951ab6984f514707f3d9%40%3Cusers.tapestry.apache.org%3E
lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c%40%3Cusers.tapestry.apache.org%3E
lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c%40%3Ccommits.tapestry.apache.org%3E
lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843%40%3Ccommits.tapestry.apache.org%3E
tapestry.apache.org/release-notes-536.html