CVE-2019-0207
HIGHApache Tapestry < 5.4.4 - Path Traversal
Title source: ruleDescription
Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.
Exploits (2)
nomisec
WORKING POC
by shoucheng3 · poc
https://github.com/shoucheng3/asf__tapestry-5_CVE-2019-0207_5-4-4
References (4)
Scores
CVSS v3
7.5
EPSS
0.0137
EPSS Percentile
80.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-22
Status
published
Products (2)
apache/tapestry
5.4.0 - 5.4.4
org.apache.tapestry/tapestry-core
5.4.0 - 5.4.5Maven
Published
Sep 16, 2019
Tracked Since
Feb 18, 2026