Bug 2150937 (CVE-2022-46366)

Summary: CVE-2022-46366 Tapestry: prior to version 4 (EOL) allows RCE though deserialization of untrusted input
Product: [Other] Security Response Reporter: Zack Miele <zmiele>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aboyko, aileenc, alazarot, asoldano, bbaranow, bmaxwell, boliveir, brian.stansberry, cdewolf, chazlett, darran.lofthouse, dhanak, dkreling, dosoudil, drichtar, ecerquei, emingora, fjuma, gjospin, gmalinko, ibek, istudens, ivassile, iweiss, janstey, jkoops, jpavlik, jrokos, jstastny, jwon, kverlaen, lgao, mnovotny, mosmerov, msochure, msvehla, nwallace, pdelbell, pdrozd, peholase, pjindal, pmackay, porcelli, pskopek, rguimara, rjohnson, rmartinc, rowaters, rrajasek, rstancel, rstepani, smaestri, sthorger, tom.jenkinson
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-12-05 16:45:41 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2150934    

Description Zack Miele 2022-12-05 16:42:51 UTC
Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.

https://lists.apache.org/thread/bwn1vjrvz1hq0wbdzj23wz322244swhj
http://www.openwall.com/lists/oss-security/2022/12/02/1

Comment 1 Zack Miele 2022-12-05 16:45:19 UTC
All versions of Tapestry used are 4.0.2+ which is beyond the versions that this vulnerability exists in.