A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: apache
Published: 2020-12-08T00:00:00
Updated: 2024-08-04T14:00:48.808Z
Reserved: 2020-08-12T00:00:00
Link: CVE-2020-17531
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-12-08T13:15:13.010
Modified: 2024-11-21T05:08:18.797
Link: CVE-2020-17531
Redhat
No data.