CVE-2022-46366

Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*

History

21 Mar 2024, 02:44

Type Values Removed Values Added
Summary
  • (es) Apache Tapestry 3.x permite la deserialización de datos que no son de confianza, lo que lleva a la ejecución remota de código. Este problema es similar pero distinto de CVE-2020-17531, que aplica la línea de versión 4.x (tampoco compatible). NOTA: Esta vulnerabilidad solo afecta a la versión 3.x de Apache Tapestry, que ya no es compatible con el fabricante. Se recomienda a los usuarios actualizar a una línea de versión compatible de Apache Tapestry.

07 Nov 2023, 03:55

Type Values Removed Values Added
Summary ** UNSUPPORTED WHEN ASSIGNED ** Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry. Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.

03 Feb 2023, 20:05

Type Values Removed Values Added
References (MISC) https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0041/MNDT-2022-0041.md - (MISC) https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0041/MNDT-2022-0041.md - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2022/12/02/1 - Third Party Advisory (MLIST) http://www.openwall.com/lists/oss-security/2022/12/02/1 - Mailing List, Third Party Advisory

06 Dec 2022, 13:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0041/MNDT-2022-0041.md -

05 Dec 2022, 19:04

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*
References (CONFIRM) https://lists.apache.org/thread/bwn1vjrvz1hq0wbdzj23wz322244swhj - (CONFIRM) https://lists.apache.org/thread/bwn1vjrvz1hq0wbdzj23wz322244swhj - Issue Tracking, Mailing List, Vendor Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2022/12/02/1 - (MLIST) http://www.openwall.com/lists/oss-security/2022/12/02/1 - Third Party Advisory
First Time Apache tapestry
Apache

02 Dec 2022, 19:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2022/12/02/1 -
CWE CWE-502

02 Dec 2022, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-02 14:15

Updated : 2024-04-11 01:17


NVD link : CVE-2022-46366

Mitre link : CVE-2022-46366

CVE.ORG link : CVE-2022-46366


JSON object : View

Products Affected

apache

  • tapestry
CWE
CWE-502

Deserialization of Untrusted Data