CVE-2020-17531
CRITICALApache Tapestry 4 - Deserialization
Title source: llmDescription
A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version.
Exploits (1)
References (3)
Scores
CVSS v3
9.8
EPSS
0.3645
EPSS Percentile
97.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-502
Status
published
Affected Products (2)
apache/tapestry
< 5.0.1
org.apache.tapestry/tapestry-project
< 5.0.1Maven
Timeline
Published
Dec 08, 2020
Tracked Since
Feb 18, 2026