CVE-2019-10071
Description
The code which checks HMAC in form submissions used String.equals() for comparisons, which results in a timing side channel for the comparison of the HMAC signatures. This could lead to remote code execution if an attacker is able to determine the correct signature for their payload. The comparison should be done with a constant time algorithm instead.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A timing side-channel vulnerability in Apache Tapestry's HMAC comparison could let an attacker forge signatures and achieve remote code execution.
Root
Cause
CVE-2019-10071 affects Apache Tapestry, a Java web framework. The vulnerability lies in the code that validates HMAC signatures on form submissions. Instead of using a constant-time comparison algorithm, the framework employs String.equals(), which performs byte-by-byte comparison and short-circuits on the first mismatch [1]. This creates a timing side channel that leaks information about the correct signature.
Exploitation
An attacker can exploit this by sending a series of crafted payloads to a Tapestry application that includes form submissions with HMAC validation. By measuring the server's response times—or more precisely, the time taken to compare HMAC values—the attacker can incrementally deduce the correct signature for their payload [1]. No special privileges are required; the attacker only needs network access to the vulnerable application. Because String.equals() stops after the first differing byte, the attacker can observe slight timing differences that reveal which prefix bytes are correct.
Impact
Successfully determining the correct HMAC signature allows the attacker to bypass integrity checks on form data. This can lead to arbitrary data manipulation and, critically, remote code execution (RCE) if the attacker can craft a payload that is subsequently processed by the application [1]. The lack of constant-time comparison effectively undermines the security of the HMAC mechanism.
Mitigation
Apache Tapestry has released patches that replace the insecure comparison with a constant-time algorithm [1]. Users should upgrade to a fixed version as specified in the advisory. No workaround is available; a complete fix requires updating the framework libraries. The vulnerability is rated high severity (CVSS 7.5) and, although not yet observed in exploitation campaigns, its potential for RCE makes timely patching critical.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.tapestry:tapestry-coreMaven | >= 5.4, < 5.4.5 | 5.4.5 |
Affected products
2- Apache/Apache Tapestryv5Range: Apache Tapestry 5.4.0 to 5.4.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- github.com/advisories/GHSA-fgmr-vx7c-5wj6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-10071ghsaADVISORY
- lists.apache.org/thread.html/6e8f42c88da7be3c60aafe3f6a85eb00b4f8b444de26b38d36233a43%40%3Cusers.tapestry.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/6e8f42c88da7be3c60aafe3f6a85eb00b4f8b444de26b38d36233a43@%3Cusers.tapestry.apache.org%3EghsaWEB
- lists.apache.org/thread.html/7a437dad5af7309aba4d01bfc2463b3ac34e6aafaa565381d3a36460%40%3Cusers.tapestry.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/7a437dad5af7309aba4d01bfc2463b3ac34e6aafaa565381d3a36460@%3Cusers.tapestry.apache.org%3EghsaWEB
- lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c%40%3Cusers.tapestry.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c%40%3Ccommits.tapestry.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843%40%3Ccommits.tapestry.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3EghsaWEB
News mentions
0No linked articles in our index yet.