Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAE_88GbjgOf0v=B7w2PTa039pmZg5jRM0iN_35vxMNNVR9EweQ@mail.gmail.com>
Date: Fri, 13 Sep 2019 11:40:00 -0300
From: "Thiago H. de Paula Figueiredo" <thiagohp@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2019-10071: Apache Tapestry vulnerability disclosure

CVE-2019-0207: Apache Tapestry 5.4.2 Path Traversal vulnerability
Severity: important
Vendor: The Apache Software Foundation
Versions affected: all Apache Tapestry versions between 5.4.0, including
its betas, and 5.4.3.

Description: The code which checks HMAC in form submissions used
String.equals() for comparisons, which results in a timing side channel for
the comparison of the HMAC signatures. This could lead to remote code
execution if an attacker is able to determine the correct signature for
their payload. The comparison should be done with a constant time algorithm
instead.

Mitigation:
Upgrade to Tapestry 5.4.5, which is a drop-in replacement for any 5.4.x
version.

Credit:
David Tomaschik of the Google Security Team

-- 
Thiago H. de Paula Figueiredo

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.