Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.tapestry/tapestry-core
  4. ›
  5. CVE-2014-1972

CVE-2014-1972: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

May 13, 2022 (updated August 16, 2023)

Apache Tapestry before 5.3.6 relies on client-side object storage without checking whether a client has modified an object, which allows remote attackers to cause a denial of service (resource consumption) or execute arbitrary code via crafted serialized data.

References

  • jvn.jp/en/jp/JVN17611367/index.html
  • jvndb.jvn.jp/jvndb/JVNDB-2015-000118
  • seclists.org/fulldisclosure/2019/Aug/20
  • www.openwall.com/lists/oss-security/2019/08/23/5
  • github.com/advisories/GHSA-c438-8cvq-pxxx
  • github.com/apache/tapestry-5/commit/5ad5257fdfacbad2c7c480fdf2afa15d9a37e6b0
  • issues.apache.org/jira/browse/TAP5-2008
  • lists.apache.org/thread.html/84e99dedad2ecb4676de93c3ab73a8a10882951ab6984f514707f3d9@%3Cusers.tapestry.apache.org%3E
  • lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3E
  • lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3E
  • lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3E
  • nvd.nist.gov/vuln/detail/CVE-2014-1972
  • tapestry.apache.org/release-notes-536.html

Code Behaviors & Features

Detect and mitigate CVE-2014-1972 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 5.3.6

Fixed versions

  • 5.3.6

Solution

Upgrade to version 5.3.6 or above.

Impact 7.8 HIGH

AV:N/AC:L/Au:N/C:N/I:N/A:C

Learn more about CVSS

Weakness

  • CWE-399
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

maven/org.apache.tapestry/tapestry-core/CVE-2014-1972.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:07 +0000.