{"id":"CVE-2019-0207","details":"Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -\u003e AssetDispatcher -\u003e ContextResource`, which doesn't filter the character `\\`, so attacker can perform a path traversal attack to read any files on Windows platform.","aliases":["GHSA-89r3-rcpj-h7w6"],"modified":"2026-03-15T22:21:10.872688Z","published":"2019-09-16T17:15:13.183Z","references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/765be3606d865de513f6df9288842c3cf58b09a987c617a535f2b99d%40%3Cusers.tapestry.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c%40%3Cusers.tapestry.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c%40%3Ccommits.tapestry.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843%40%3Ccommits.tapestry.apache.org%3E"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/tapestry-5","events":[{"introduced":"2672e9847ad56d2b3f83c28319b532b92d6af5c9"},{"last_affected":"d29cc6778eb0c75e45139274005bba1c4f58907f"}],"database_specific":{"versions":[{"introduced":"5.4.0"},{"last_affected":"5.4.4"}]}}],"versions":["5.4.0","5.4.1","5.4.2","5.4.3","5.4.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-0207.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}