Lucene search

K
cve[email protected]CVE-2022-46366
HistoryDec 02, 2022 - 2:15 p.m.

CVE-2022-46366

2022-12-0214:15:10
CWE-502
web.nvd.nist.gov
51
cve-2022-46366
apache tapestry
deserialization
remote code execution
unsupported version

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.06 Low

EPSS

Percentile

93.5%

Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.

Affected configurations

Vulners
NVD
Node
apachetapestryRange4.0.0
CPENameOperatorVersion
apache:tapestryapache tapestrylt4.0.0

CNA Affected

[
  {
    "vendor": "Apache Software Foundation",
    "product": "Apache Tapestry",
    "versions": [
      {
        "version": "Apache Tapestry",
        "status": "affected",
        "lessThan": "4.0.0",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.06 Low

EPSS

Percentile

93.5%