CVE-2022-46366
Published on: Not Yet Published
Last Modified on: 02/03/2023 08:05:00 PM UTC
Certain versions of Tapestry from Apache contain the following vulnerability:
** UNSUPPORTED WHEN ASSIGNED ** Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.
- CVE-2022-46366 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
- Affected Vendor/Software:
Apache Software Foundation - Apache Tapestry version < 4.0.0
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Vulnerability-Disclosures/MNDT-2022-0041.md at master · mandiant/Vulnerability-Disclosures · GitHub | github.com text/html |
![]() |
oss-security - CVE-2022-46366: Apache Tapestry prior to version 4 (EOL) allows RCE though deserialization of untrusted input | www.openwall.com text/html |
![]() |
No Description Provided | lists.apache.org text/html |
![]() |
There are currently no QIDs associated with this CVE
Exploit/POC from Github
CVE-2022-46366
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Apache | Tapestry | All | All | All | All |
- cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*:
Discovery Credit
Apache would like to thank Ilyass El Hadi from Mandiant for reporting this issue
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-46366 : #Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution.… twitter.com/i/web/status/1… | 2022-12-02 14:03:58 |
![]() |
Potentially Critical CVE Detected! CVE-2022-46366 ** UNSUPPORTED WHEN ASSIGNED ** Apache Tapestry 3.x allows deseri… twitter.com/i/web/status/1… | 2022-12-02 14:55:57 |
![]() |
CVE-2022-46366: Apache Tapestry prior to version 4 (EOL) allows RCE though deserialization of untrusted input: Post… twitter.com/i/web/status/1… | 2022-12-02 17:17:32 |
![]() |
CVE-2022-46366 | 2022-12-02 14:39:04 |