CVE-2019-0207

HIGH

Apache Tapestry < 5.4.4 - Path Traversal

Title source: rule

Description

Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.

Exploits (2)

nomisec WORKING POC
by shoucheng3 · poc
https://github.com/shoucheng3/asf__tapestry-5_CVE-2019-0207_5-4-4

Scores

CVSS v3 7.5
EPSS 0.0137
EPSS Percentile 80.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-22
Status published
Products (2)
apache/tapestry 5.4.0 - 5.4.4
org.apache.tapestry/tapestry-core 5.4.0 - 5.4.5Maven
Published Sep 16, 2019
Tracked Since Feb 18, 2026