You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@tapestry.apache.org by "Thiago H. de Paula Figueiredo" <th...@gmail.com> on 2020/12/08 12:11:40 UTC
CVE-2020-17531: Deserialization flaw in EOL Tapestry 4.
Description:
A Java Serialization vulnerability was found in Apache Tapestry 4.
Apache Tapestry 4 will attempt to deserialize the "sp" parameter even
before invoking the page's validate method, leading to deserialization
without authentication.
Apache Tapestry 4 reached end of life in 2008 and no update to address
this issue will be released. Apache Tapestry 5 versions are not
vulnerable to this issue. Users of Apache Tapestry 4 should upgrade
to the latest Apache Tapestry 5 version.
Credit:
Apache Tapestry would like to thank Adrian Bravo (@adrianbravon) for
reporting this issue.