-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
The vulnerability stemmed from missing HMAC validation during client-side object deserialization. The commit 5ad5257 shows these functions were modified to add HMAC signing/validation. The original implementations lacked: 1) HMAC verification in decodeClientData before deserialization, and 2) HMAC generation in getClientData when storing data. This allowed malicious payloads to be accepted as valid serialized objects, enabling CWE-502 exploits.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.tapestry:tapestry-core | maven | < 5.3.6 | 5.3.6 |