CVE-2019-0195

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-0195
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-0195.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-0195
Aliases
Published
2019-09-16T16:15:10Z
Modified
2024-10-12T04:09:47.048943Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the webapp's AppModule class, the value of this symbol could be used to craft a Java deserialization attack, thus running malicious injected Java code. The vector would be the t:formdata parameter from the Form component.

References

Affected packages

Git / github.com/apache/tapestry-5

Affected ranges

Type
GIT
Repo
https://github.com/apache/tapestry-5
Events

Affected versions

5.*

5.4.0
5.4.1
5.4.2
5.4.3