Apache Tapestry up to 5.3.5 Client-Side Object Storage resource management

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.0 | $0-$5k | 0.00 |
Summary
A vulnerability marked as critical has been reported in Apache Tapestry up to 5.3.5. Affected by this issue is some unknown functionality of the component Client-Side Object Storage. The manipulation leads to resource management. This vulnerability is referenced as CVE-2014-1972. No exploit is available. It is suggested to upgrade the affected component.
Details
A vulnerability, which was classified as critical, has been found in Apache Tapestry up to 5.3.5. This issue affects an unknown code of the component Client-Side Object Storage. The manipulation with an unknown input leads to a resource management vulnerability. Using CWE to declare the problem leads to CWE-399. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
Apache Tapestry before 5.3.6 relies on client-side object storage without checking whether a client has modified an object, which allows remote attackers to cause a denial of service (resource consumption) or execute arbitrary code via crafted serialized data.
The weakness was published 08/22/2015 (Website). It is possible to read the advisory at tapestry.apache.org. The identification of this vulnerability is CVE-2014-1972 since 02/17/2014. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. The technical details are unknown and an exploit is not publicly available.
The commercial vulnerability scanner Qualys is able to test this issue with plugin 11572 (Apache Tapestry Data Deserialization Denial of Service Vulnerability).
Upgrading to version 5.3.6 eliminates this vulnerability.
The vulnerability is also documented in the databases at SecurityFocus (BID 76522†) and Vulnerability Center (SBV-53989†). Be aware that VulDB is the high quality source for vulnerability data.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.apache.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 7.0
VulDB Base Score: 7.3
VulDB Temp Score: 7.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource managementCWE: CWE-399 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Tapestry 5.3.6
Timeline
02/17/2014 🔍08/20/2015 🔍
08/22/2015 🔍
08/22/2015 🔍
08/24/2015 🔍
10/27/2015 🔍
12/20/2024 🔍
Sources
Vendor: apache.orgAdvisory: tapestry.apache.org
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-1972 (🔍)
GCVE (CVE): GCVE-0-2014-1972
GCVE (VulDB): GCVE-100-77375
SecurityFocus: 76522
Vulnerability Center: 53989 - Apache Tapestry <5.3.6 Remote DoS via Crafted Serialized Data, High
Entry
Created: 08/24/2015 10:14Updated: 12/20/2024 01:34
Changes: 08/24/2015 10:14 (48), 03/01/2018 10:20 (8), 12/20/2024 01:34 (20)
Complete: 🔍
Cache ID: 216:C0D:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.