CVE-2019-0195
Description
Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the webapp's AppModule class, the value of this symbol could be used to craft a Java deserialization attack, thus running malicious injected Java code. The vector would be the t:formdata parameter from the Form component.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A path traversal in Apache Tapestry allows attackers to download the HMAC secret key file from the classpath, enabling remote code execution via deserialization.
Vulnerability
Description
The vulnerability resides in Apache Tapestry's asset handling mechanism. By manipulating classpath asset file URLs, an attacker can traverse directories and guess the path to a known file within the classpath, such as AppModule.class. This file contains the value of the tapestry.hmac-passphrase configuration symbol, which is used for HMAC-based form integrity checks [1].
Exploitation
Conditions
No authentication is required. The attacker only needs to send crafted requests to the target application. For instance, requesting a URL like /assets/something/services/AppModule.class could retrieve the compiled class file that contains the HMAC secret key. The original fix for this issue was a blacklist filter that blocked requests ending with .class, .properties, or .xml, but this was later bypassed in CVE-2021-27850 by using alternative extensions or encoding techniques [2].
Impact
If the attacker successfully retrieves the tapestry.hmac-passphrase value, they can forge the t:formdata parameter used by the Form component. This allows crafting a malicious serialized Java object that, when deserialized by the server, leads to arbitrary Java code execution. The overall impact ranges from sensitive data exposure to a full compromise of the affected system [1].
Mitigation
Upgrading to a patched version is the recommended remediation. The vulnerability was addressed in Apache Tapestry 5.4.5, 5.5.0, 5.6.2, and 5.7.0 (with further fixes for the bypass). Organizations still using older versions should apply security updates immediately to prevent unauthenticated RCE attacks [1][2].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.tapestry:tapestry-coreMaven | >= 5.4.0, < 5.4.5 | 5.4.5 |
Affected products
2- tapestry/AppModuledescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- github.com/advisories/GHSA-6mwh-fw4p-75fjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-0195ghsaADVISORY
- www.openwall.com/lists/oss-security/2021/04/15/1ghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/5173c4eed06e2fca6fd5576ed723ff6bb1711738ec515cb51a04ab24%40%3Cusers.tapestry.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/5173c4eed06e2fca6fd5576ed723ff6bb1711738ec515cb51a04ab24@%3Cusers.tapestry.apache.org%3EghsaWEB
- lists.apache.org/thread.html/6c40c1e03d2131119f9b77882431a0050f02bf9cae9ee48b84d012df%40%3Cusers.tapestry.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/6c40c1e03d2131119f9b77882431a0050f02bf9cae9ee48b84d012df@%3Cusers.tapestry.apache.org%3EghsaWEB
- lists.apache.org/thread.html/a4092cb3bacb143571024e79c0016c039b6c982423daa33a7a5c794a%40%3Cusers.tapestry.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/a4092cb3bacb143571024e79c0016c039b6c982423daa33a7a5c794a@%3Cusers.tapestry.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r237ff7f286bda31682c254550c1ebf92b0ec61329b32fbeb2d1c8751%40%3Cusers.tapestry.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r237ff7f286bda31682c254550c1ebf92b0ec61329b32fbeb2d1c8751@%3Cusers.tapestry.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c%40%3Ccommits.tapestry.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843%40%3Ccommits.tapestry.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3EghsaWEB
News mentions
0No linked articles in our index yet.