In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run.
References
Link | Resource |
---|---|
https://lists.apache.org/thread.html/r50eb12e8a12074a9b7ed63cbab91d180d19cc23dc1da3ed5b6e1280f%40%3Cusers.tapestry.apache.org%3E | Mailing List Vendor Advisory |
https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb@%3Cusers.tapestry.apache.org%3E | Mailing List Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-09-30 11:15
Updated : 2021-05-05 06:18
NVD link : CVE-2020-13953
Mitre link : CVE-2020-13953
JSON object : View
CWE
CWE-552
Files or Directories Accessible to External Parties
Products Affected
apache
- tapestry