In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb%40%3Cusers.tapestry.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r50eb12e8a12074a9b7ed63cbab91d180d19cc23dc1da3ed5b6e1280f%40%3Cusers.tapestry.apache.org%3E - Mailing List, Vendor Advisory |
07 Nov 2023, 03:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-09-30 18:15
Updated : 2024-11-21 05:02
NVD link : CVE-2020-13953
Mitre link : CVE-2020-13953
CVE.ORG link : CVE-2020-13953
JSON object : View
Products Affected
apache
- tapestry
CWE
CWE-552
Files or Directories Accessible to External Parties