CVE-2014-1972

Apache Tapestry before 5.3.6 relies on client-side object storage without checking whether a client has modified an object, which allows remote attackers to cause a denial of service (resource consumption) or execute arbitrary code via crafted serialized data.
References
Link Resource
http://jvn.jp/en/jp/JVN17611367/index.html Vendor Advisory
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000118 Vendor Advisory
http://seclists.org/fulldisclosure/2019/Aug/20
http://www.openwall.com/lists/oss-security/2019/08/23/5
https://issues.apache.org/jira/browse/TAP5-2008
https://lists.apache.org/thread.html/84e99dedad2ecb4676de93c3ab73a8a10882951ab6984f514707f3d9%40%3Cusers.tapestry.apache.org%3E
https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c%40%3Cusers.tapestry.apache.org%3E
https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c%40%3Ccommits.tapestry.apache.org%3E
https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843%40%3Ccommits.tapestry.apache.org%3E
https://tapestry.apache.org/release-notes-536.html Vendor Advisory
http://jvn.jp/en/jp/JVN17611367/index.html Vendor Advisory
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000118 Vendor Advisory
http://seclists.org/fulldisclosure/2019/Aug/20
http://www.openwall.com/lists/oss-security/2019/08/23/5
https://issues.apache.org/jira/browse/TAP5-2008
https://lists.apache.org/thread.html/84e99dedad2ecb4676de93c3ab73a8a10882951ab6984f514707f3d9%40%3Cusers.tapestry.apache.org%3E
https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c%40%3Cusers.tapestry.apache.org%3E
https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c%40%3Ccommits.tapestry.apache.org%3E
https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843%40%3Ccommits.tapestry.apache.org%3E
https://tapestry.apache.org/release-notes-536.html Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:05

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN17611367/index.html - Vendor Advisory () http://jvn.jp/en/jp/JVN17611367/index.html - Vendor Advisory
References () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000118 - Vendor Advisory () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000118 - Vendor Advisory
References () http://seclists.org/fulldisclosure/2019/Aug/20 - () http://seclists.org/fulldisclosure/2019/Aug/20 -
References () http://www.openwall.com/lists/oss-security/2019/08/23/5 - () http://www.openwall.com/lists/oss-security/2019/08/23/5 -
References () https://issues.apache.org/jira/browse/TAP5-2008 - () https://issues.apache.org/jira/browse/TAP5-2008 -
References () https://lists.apache.org/thread.html/84e99dedad2ecb4676de93c3ab73a8a10882951ab6984f514707f3d9%40%3Cusers.tapestry.apache.org%3E - () https://lists.apache.org/thread.html/84e99dedad2ecb4676de93c3ab73a8a10882951ab6984f514707f3d9%40%3Cusers.tapestry.apache.org%3E -
References () https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c%40%3Cusers.tapestry.apache.org%3E - () https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c%40%3Cusers.tapestry.apache.org%3E -
References () https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c%40%3Ccommits.tapestry.apache.org%3E - () https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c%40%3Ccommits.tapestry.apache.org%3E -
References () https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843%40%3Ccommits.tapestry.apache.org%3E - () https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843%40%3Ccommits.tapestry.apache.org%3E -
References () https://tapestry.apache.org/release-notes-536.html - Vendor Advisory () https://tapestry.apache.org/release-notes-536.html - Vendor Advisory

07 Nov 2023, 02:19

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/84e99dedad2ecb4676de93c3ab73a8a10882951ab6984f514707f3d9@%3Cusers.tapestry.apache.org%3E', 'name': '[tapestry-users] 20190913 Re: CVE-2019-10071: Apache Tapestry vulnerability disclosure', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3E', 'name': '[tapestry-commits] 20200531 svn commit: r1061326 [4/4] - in /websites/production/tapestry/content: ./ cache/', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3E', 'name': '[tapestry-commits] 20200111 svn commit: r1055136 [2/2] - in /websites/production/tapestry/content: cache/main.pageCache component-rendering.html content-type-and-markup.html dom.html https.html request-processing.html response-compression.html security.html url-rewriting.html', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3E', 'name': '[tapestry-users] 20191007 Re: CVE-2019-10071: Apache Tapestry vulnerability disclosure', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c%40%3Ccommits.tapestry.apache.org%3E -
  • () https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c%40%3Cusers.tapestry.apache.org%3E -
  • () https://lists.apache.org/thread.html/84e99dedad2ecb4676de93c3ab73a8a10882951ab6984f514707f3d9%40%3Cusers.tapestry.apache.org%3E -
  • () https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843%40%3Ccommits.tapestry.apache.org%3E -

Information

Published : 2015-08-22 23:59

Updated : 2024-11-21 02:05


NVD link : CVE-2014-1972

Mitre link : CVE-2014-1972

CVE.ORG link : CVE-2014-1972


JSON object : View

Products Affected

apache

  • tapestry
CWE
CWE-399

Resource Management Errors