You are viewing a plain text version of this content. The canonical link for it is here.
Posted to announce@apache.org by Arnout Engelen <en...@apache.org> on 2022/12/02 13:36:02 UTC

CVE-2022-46366: Apache Tapestry prior to version 4 (EOL) allows RCE though deserialization of untrusted input

Description:

** UNSUPPORTED WHEN ASSIGNED ** Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.

Credit:

Apache would like to thank Ilyass El Hadi from Mandiant for reporting this issue