Description
Acunetix has detected that the web application is based on Apache Tapestry. Apache Tapestry has a vulnerability that allows an unauthenticated user to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker can use it to achieve RCE on the server.
Remediation
Upgrade to the latest version of Apache Tapestry
References
Related Vulnerabilities
ownCloud Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-5341)
WordPress Plugin wp superb Slideshow Information Disclosure (2.4)
Telerik Web UI Unrestricted File Upload (CVE-2017-11317)
WordPress Plugin Woody ad snippets-Insert Header Footer Code, AdSense Ads PHP Code Injection (1.3)
Python Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-2183)