GHSA-vc39-x7w6-6vj7

Suggest an improvement
Source
https://github.com/advisories/GHSA-vc39-x7w6-6vj7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-vc39-x7w6-6vj7/GHSA-vc39-x7w6-6vj7.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vc39-x7w6-6vj7
Aliases
  • CVE-2022-46366
Published
2022-12-02T15:30:26Z
Modified
2023-11-08T04:10:56.433801Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Apache Tapestry allows deserialization of untrusted data
Details

* UNSUPPORTED WHEN ASSIGNED * Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line.

NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.

Database specific
{
    "nvd_published_at": "2022-12-02T14:15:00Z",
    "github_reviewed_at": "2022-12-05T23:15:18Z",
    "severity": "CRITICAL",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-502"
    ]
}
References

Affected packages

Maven / org.apache.tapestry:tapestry-core

Package

Name
org.apache.tapestry:tapestry-core
View open source insights on deps.dev
Purl
pkg:maven/org.apache.tapestry/tapestry-core

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.0
Fixed
5.0.1

Database specific

{
    "last_known_affected_version_range": "< 4.0"
}