module
Apache Tapestry HMAC secret key leak
| Disclosed | Created |
|---|---|
| Apr 15, 2021 | Jul 23, 2021 |
Disclosed
Apr 15, 2021
Created
Jul 23, 2021
Description
This exploit finds the HMAC secret key used in Java serialization by Apache Tapestry. This key
is located in the file AppModule.class by default and looks like the standard representation of UUID in hex digits (hd) :
6hd-4hd-4hd-4hd-12hd
If the HMAC key has been changed to look differently, this module won't find the key because it tries to download the file
and then uses a specific regex to find the key.
is located in the file AppModule.class by default and looks like the standard representation of UUID in hex digits (hd) :
6hd-4hd-4hd-4hd-12hd
If the HMAC key has been changed to look differently, this module won't find the key because it tries to download the file
and then uses a specific regex to find the key.
Authors
Johannes Moritz
Yann Castel (yann.castel Yann Castel ([email protected])
Yann Castel (yann.castel Yann Castel ([email protected])
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.