In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-13953.json"