Apache Tapestry before 5.3.6 relies on client-side object storage without checking whether a client has modified an object, which allows remote attackers to cause a denial of service (resource consumption) or execute arbitrary code via crafted serialized data.
References
Configurations
History
21 Nov 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN17611367/index.html - Vendor Advisory | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000118 - Vendor Advisory | |
References | () http://seclists.org/fulldisclosure/2019/Aug/20 - | |
References | () http://www.openwall.com/lists/oss-security/2019/08/23/5 - | |
References | () https://issues.apache.org/jira/browse/TAP5-2008 - | |
References | () https://lists.apache.org/thread.html/84e99dedad2ecb4676de93c3ab73a8a10882951ab6984f514707f3d9%40%3Cusers.tapestry.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c%40%3Cusers.tapestry.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c%40%3Ccommits.tapestry.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843%40%3Ccommits.tapestry.apache.org%3E - | |
References | () https://tapestry.apache.org/release-notes-536.html - Vendor Advisory |
07 Nov 2023, 02:19
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2015-08-22 23:59
Updated : 2024-11-21 02:05
NVD link : CVE-2014-1972
Mitre link : CVE-2014-1972
CVE.ORG link : CVE-2014-1972
JSON object : View
Products Affected
apache
- tapestry
CWE
CWE-399
Resource Management Errors