[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE-2024-27439: Apache Wicket: Possible bypass of CSRF protection
From: Emond Papegaaij <papegaaij () apache ! org>
Date: 2024-03-19 10:47:38
Message-ID: 6a508792-1abe-83b2-c675-f60d2efab9dc () apache ! org
[Download RAW message or body]
Severity: moderate
Affected versions:
- Apache Wicket 9.1.0 through 9.16.0
- Apache Wicket 10.0.0-M1 before 10.0.0
Description:
An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF \
protection in Apache Wicket. This issue affects Apache Wicket: from 9.1.0 through 9.16.0, and \
the milestone releases for the 10.0 series. Apache Wicket 8.x does not support CSRF protection \
via the fetch metadata headers and as such is not affected.
Users are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue.
Credit:
Jo Theunis (finder)
References:
https://wicket.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-27439
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic