VYPR
High severityNVD Advisory· Published Sep 16, 2019· Updated Aug 4, 2024

CVE-2019-0207

CVE-2019-0207

Description

Tapestry processes assets /assets/ctx using classes chain StaticFilesFilter -> AssetDispatcher -> ContextResource, which doesn't filter the character \, so attacker can perform a path traversal attack to read any files on Windows platform.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Tapestry fails to filter the backslash character in asset URLs, enabling path traversal on Windows to read arbitrary files.

Apache Tapestry processes assets via the /assets/ctx path using a chain of classes (StaticFilesFilter -> AssetDispatcher -> ContextResource). The vulnerability arises because this chain does not filter the backslash character (\), which is accepted as a path separator on the Windows operating system [1].

An unauthenticated attacker can craft a URL containing \ to traverse outside the intended assets directory. For example, a request to /assets/ctx/..\..\windows\win.ini would allow reading files outside the web application root. The attack requires that the Tapestry application is deployed on a Windows platform [1].

Successful exploitation allows an attacker to read arbitrary files on the Windows file system that the application server process can access. This could include sensitive configuration files, source code, or other data, leading to information disclosure [1].

Apache has released patches for Tapestry versions 5.4.5 and 5.5.0. Users are advised to upgrade to these versions or later. For versions that cannot be upgraded, applying input validation to filter backslashes in asset URLs may serve as a workaround [1].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.tapestry:tapestry-coreMaven
>= 5.4.0, < 5.4.55.4.5

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.