Serialization vulnerability in Apache Tapestry
Critical severity
GitHub Reviewed
Published
Feb 9, 2022
to the GitHub Advisory Database
•
Updated Jan 31, 2023
Package
Affected versions
>= 4.0, < 5.0.1
Patched versions
5.0.1
Description
Published by the National Vulnerability Database
Dec 8, 2020
Reviewed
Apr 9, 2021
Published to the GitHub Advisory Database
Feb 9, 2022
Last updated
Jan 31, 2023
A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version.
References