Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.
References
Configurations
Information
Published : 2019-09-16 10:15
Updated : 2023-02-28 12:03
NVD link : CVE-2019-0207
Mitre link : CVE-2019-0207
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
apache
- tapestry