Tapestry processes assets /assets/ctx using classes chain StaticFilesFilter -> AssetDispatcher -> ContextResource, which doesn't filter the character \, so attacker can perform a path traversal attack to read any files on Windows platform.
{
"github_reviewed": true,
"github_reviewed_at": "2019-11-18T14:18:47Z",
"nvd_published_at": "2019-09-16T17:15:00Z",
"severity": "HIGH",
"cwe_ids": [
"CWE-22"
]
}