This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apache Tapestry. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ContextAssetRequestHandler class. The issue results from the improper filtering of HTTP requests. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tapestry |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-12101 is classified as critical due to the potential for sensitive information disclosure without authentication.
To fix ZDI-CAN-12101, update to the latest version of Apache Tapestry where the vulnerability has been addressed.
ZDI-CAN-12101 affects certain versions of Apache Tapestry prior to the fix in the latest release.
Yes, ZDI-CAN-12101 can be exploited remotely by attackers without requiring authentication.
ZDI-CAN-12101 may allow attackers to disclose sensitive information from the affected installations of Apache Tapestry.