Learn about CVE-2019-0195 affecting Apache Tapestry 5.4.0 to 5.4.3. Discover how attackers can exploit URLs to download files and execute Java deserialization attacks.
Apache Tapestry 5.4.0 to 5.4.3 allows attackers to download specific files by manipulating URLs, potentially leading to a Java deserialization attack.
Understanding CVE-2019-0195
Apache Tapestry is vulnerable to information disclosure through classpath asset file URL manipulation, enabling attackers to execute Java deserialization attacks.
What is CVE-2019-0195?
Attackers can guess and download files by manipulating classpath asset file URLs
Exploiting the tapestry.hmac-passphrase configuration symbol can lead to Java deserialization attacks
The vulnerability is present in the t:formdata parameter of the Form component
The Impact of CVE-2019-0195
Attackers can obtain sensitive information from the classpath, potentially leading to unauthorized access
Execution of malicious Java code through Java deserialization attacks
Technical Details of CVE-2019-0195
Apache Tapestry 5.4.0 to 5.4.3 is affected by this vulnerability.
Vulnerability Description
Attackers can download specific files by manipulating URLs
Exploiting the tapestry.hmac-passphrase configuration symbol can lead to Java deserialization attacks
Affected Systems and Versions
Product: Apache Tapestry
Versions: 5.4.0 to 5.4.3
Exploitation Mechanism
Manipulation of classpath asset file URLs
Exploiting the t:formdata parameter of the Form component