Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vc39-x7w6-6vj7 | Apache Tapestry allows deserialization of untrusted data |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T14:31:46.317Z
Reserved: 2022-12-02T00:00:00
Link: CVE-2022-46366
Updated: 2024-08-03T14:31:46.317Z
Status : Modified
Published: 2022-12-02T14:15:10.223
Modified: 2024-11-21T07:30:28.337
Link: CVE-2022-46366
OpenCVE Enrichment
No data.
Github GHSA