Description
A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c566-2grg-mjwg | Serialization vulnerability in Apache Tapestry |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T14:00:48.808Z
Reserved: 2020-08-12T00:00:00.000Z
Link: CVE-2020-17531
No data.
Status : Modified
Published: 2020-12-08T13:15:13.010
Modified: 2024-11-21T05:08:18.797
Link: CVE-2020-17531
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA