Path traversal attack on Windows platforms
High severity
GitHub Reviewed
Published
Nov 18, 2019
to the GitHub Advisory Database
•
Updated Mar 6, 2023
Package
Affected versions
>= 5.4.0, < 5.4.5
Patched versions
5.4.5
Description
Published by the National Vulnerability Database
Sep 16, 2019
Reviewed
Nov 18, 2019
Published to the GitHub Advisory Database
Nov 18, 2019
Last updated
Mar 6, 2023
Tapestry processes assets
/assets/ctx
using classes chainStaticFilesFilter -> AssetDispatcher -> ContextResource
, which doesn't filter the character\
, so attacker can perform a path traversal attack to read any files on Windows platform.References