[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE-2019-10071: Apache Tapestry vulnerability disclosure
From:       "Thiago H. de Paula Figueiredo" <thiagohp () gmail ! com>
Date:       2019-09-13 14:40:00
Message-ID: CAE_88GbjgOf0v=B7w2PTa039pmZg5jRM0iN_35vxMNNVR9EweQ () mail ! gmail ! com
[Download RAW message or body]


CVE-2019-0207: Apache Tapestry 5.4.2 Path Traversal vulnerability
Severity: important
Vendor: The Apache Software Foundation
Versions affected: all Apache Tapestry versions between 5.4.0, including
its betas, and 5.4.3.

Description: The code which checks HMAC in form submissions used
String.equals() for comparisons, which results in a timing side channel for
the comparison of the HMAC signatures. This could lead to remote code
execution if an attacker is able to determine the correct signature for
their payload. The comparison should be done with a constant time algorithm
instead.

Mitigation:
Upgrade to Tapestry 5.4.5, which is a drop-in replacement for any 5.4.x
version.

Credit:
David Tomaschik of the Google Security Team

-- 
Thiago H. de Paula Figueiredo


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic