org.apache.tapestry:tapestry-core@5.6.3 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.tapestry:tapestry-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Information Exposure

org.apache.tapestry:tapestry-core is a Tapestry Core package for Apache Tapestry.

Affected versions of this package are vulnerable to Information Exposure via the context asset handling. It allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This is caused because the fix for CVE-2020-13953 fails to account for the backslash character in the filtering regex, and an attacker is therefore able to list and download web app files from the WEB-INF and META-INF directory using a crafted payload.

How to fix Information Exposure?

Upgrade org.apache.tapestry:tapestry-core to version 5.6.4, 5.7.2 or higher.

[5.4.0,5.6.4) [5.7.0,5.7.2)