CVE-2021-30638
moderate-risk
Published 2021-04-27
Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Apache Tapestry 5.7.0 version and Apache Tapestry 5.7.1.
Do I need to act?
~
5.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (8)
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210528-0004/
Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-21-491/
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210528-0004/
Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-21-491/
39
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
8/34 · Low
Exposure
5/34 · Minimal