You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@tapestry.apache.org by "Thiago H. de Paula Figueiredo" <th...@gmail.com> on 2020/12/08 12:11:40 UTC

CVE-2020-17531: Deserialization flaw in EOL Tapestry 4.

Description:

A Java Serialization vulnerability was found in Apache Tapestry 4.
Apache Tapestry 4 will attempt to deserialize the "sp" parameter even
before invoking the page's validate method, leading to deserialization
without authentication.

Apache Tapestry 4 reached end of life in 2008 and no update to address
this issue will be released.  Apache Tapestry 5 versions are not
vulnerable to this issue.  Users of Apache Tapestry 4 should upgrade
to the latest Apache Tapestry 5 version.

Credit:

Apache Tapestry would like to thank Adrian Bravo (@adrianbravon) for
reporting this issue.