Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.
                
            References
                    Configurations
                    Information
                Published : 2019-09-16 10:15
Updated : 2023-02-28 12:03
NVD link : CVE-2019-0207
Mitre link : CVE-2019-0207
JSON object : View
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
                apache
- tapestry
 


