Description
Apache Tapestry before 5.3.6 relies on client-side object storage without checking whether a client has modified an object, which allows remote attackers to cause a denial of service (resource consumption) or execute arbitrary code via crafted serialized data.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3496 | Apache Tapestry before 5.3.6 relies on client-side object storage without checking whether a client has modified an object, which allows remote attackers to cause a denial of service (resource consumption) or execute arbitrary code via crafted serialized data. |
Github GHSA |
GHSA-c438-8cvq-pxxx | Apache Tapestry Unsafe Object Storage |
References
History
No history.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-08-06T09:58:15.657Z
Reserved: 2014-02-17T00:00:00.000Z
Link: CVE-2014-1972
No data.
Status : Deferred
Published: 2015-08-22T23:59:00.093
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-1972
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA