{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-17531","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","dateUpdated":"2024-08-04T14:00:48.808Z","dateReserved":"2020-08-12T00:00:00.000Z","datePublished":"2020-12-08T00:00:00.000Z"},"containers":{"cna":{"title":"Deserialization flaw in EOL Tapestry 4.","providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2022-12-02T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the \"sp\" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version."}],"affected":[{"vendor":"Apache Software Foundation","product":"Apache Tapestry","versions":[{"version":"Apache Tapestry 4","status":"affected","lessThanOrEqual":"4","versionType":"custom"}]}],"references":[{"url":"https://lists.apache.org/thread.html/r700a6aa234dbff0555d4187bdc8274d7e4c0afbf35b9a3457f09ee76%40%3Cusers.tapestry.apache.org%3E"},{"name":"[tapestry-users] 20201208 CVE-2020-17531: Deserialization flaw in EOL Tapestry 4.","tags":["mailing-list"],"url":"https://lists.apache.org/thread.html/r700a6aa234dbff0555d4187bdc8274d7e4c0afbf35b9a3457f09ee76%40%3Cusers.tapestry.apache.org%3E"},{"url":"https://security.netapp.com/advisory/ntap-20210115-0007/"},{"name":"[oss-security] 20221202 CVE-2022-46366: Apache Tapestry prior to version 4 (EOL) allows RCE though deserialization of untrusted input","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2022/12/02/1"}],"credits":[{"lang":"en","value":"Apache Tapestry would like to thank Adrian Bravo (@adrianbravon) for reporting this issue."}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-502 Deserialization of Untrusted Data","cweId":"CWE-502"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T14:00:48.808Z"},"title":"CVE Program Container","references":[{"url":"https://lists.apache.org/thread.html/r700a6aa234dbff0555d4187bdc8274d7e4c0afbf35b9a3457f09ee76%40%3Cusers.tapestry.apache.org%3E","tags":["x_transferred"]},{"name":"[tapestry-users] 20201208 CVE-2020-17531: Deserialization flaw in EOL Tapestry 4.","tags":["mailing-list","x_transferred"],"url":"https://lists.apache.org/thread.html/r700a6aa234dbff0555d4187bdc8274d7e4c0afbf35b9a3457f09ee76%40%3Cusers.tapestry.apache.org%3E"},{"url":"https://security.netapp.com/advisory/ntap-20210115-0007/","tags":["x_transferred"]},{"name":"[oss-security] 20221202 CVE-2022-46366: Apache Tapestry prior to version 4 (EOL) allows RCE though deserialization of untrusted input","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/12/02/1"}]}]}}