Bug 2150937 (CVE-2022-46366) - CVE-2022-46366 Apache Tapestry: prior to version 4 (EOL) allows RCE though deserialization of untrusted input
Summary: CVE-2022-46366 Apache Tapestry: prior to version 4 (EOL) allows RCE though de...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2022-46366
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2150934
TreeView+ depends on / blocked
 
Reported: 2022-12-05 16:42 UTC by Zack Miele
Modified: 2022-12-05 16:45 UTC (History)
43 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-12-05 16:45:41 UTC
Embargoed:


Attachments (Terms of Use)

Description Zack Miele 2022-12-05 16:42:51 UTC
Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.

https://lists.apache.org/thread/bwn1vjrvz1hq0wbdzj23wz322244swhj
http://www.openwall.com/lists/oss-security/2022/12/02/1

Comment 1 Zack Miele 2022-12-05 16:45:19 UTC
All versions of Tapestry used are 4.0.2+ which is beyond the versions that this vulnerability exists in.


Note You need to log in before you can comment on or make changes to this bug.