Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.
No PoCs from references.
- https://github.com/shoucheng3/asf__tapestry-5_CVE-2019-0207_5-4-4
- https://github.com/shoucheng3/tapestry-5-cve-2019-0207