VYPR
High severityNVD Advisory· Published Apr 27, 2021· Updated Aug 3, 2024

An Information Disclosure due to insufficient input validation exists in Apache Tapestry 5.4.0 and later

CVE-2021-30638

Description

Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Apache Tapestry 5.7.0 version and Apache Tapestry 5.7.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Tapestry fails to properly filter HTTP requests, letting remote attackers download WEB-INF files without authentication.

Vulnerability

An information exposure vulnerability exists in the context asset handling of Apache Tapestry [1][2]. The flaw resides in the ContextAssetRequestHandler class and results from improper filtering of HTTP requests, allowing specially-constructed URLs to bypass access controls [2]. This was caused by an incomplete fix for CVE-2020-13953 [1]. Affected versions are Apache Tapestry 5.4.0 up to and including 5.6.3, as well as 5.7.0 and 5.7.1 [1][2][3].

Exploitation

No authentication is required [2]. An attacker on the network can construct a malicious URL that exploits the improper input validation [3]. The vulnerability can be triggered remotely without user interaction [2]. By sending such a request, the attacker can download files located inside the WEB-INF directory of the application [1][2].

Impact

Successful exploitation leads to disclosure of sensitive information, as files within WEB-INF may contain configuration data, credentials, or source code [2]. The information disclosure occurs in the context of the SYSTEM level, meaning the attacker gains access to files normally protected from direct access [2]. The confidentiality impact is high, while integrity and availability are not affected [2].

Mitigation

Apache released fixed versions: upgrade to 5.6.4 for the 5.4.x–5.6.x branch, or 5.7.2 for the 5.7.x branch [3]. No workaround has been provided in the available references. The vulnerability is not listed on CISA’s Known Exploited Vulnerabilities (KEV) catalog.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.tapestry:tapestry-coreMaven
>= 5.4.0, < 5.6.45.6.4
org.apache.tapestry:tapestry-coreMaven
>= 5.7.0, < 5.7.25.7.2

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.