Tapestry processes assets /assets/ctx
using classes chain StaticFilesFilter -> AssetDispatcher -> ContextResource
, which doesn't filter the character \
, so attacker can perform a path traversal attack to read any files on Windows platform.
{ "nvd_published_at": "2019-09-16T17:15:00Z", "github_reviewed_at": "2019-11-18T14:18:47Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-22" ] }