[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE-2024-27439: Apache Wicket: Possible bypass of CSRF protection
From:       Emond Papegaaij <papegaaij () apache ! org>
Date:       2024-03-19 10:47:38
Message-ID: 6a508792-1abe-83b2-c675-f60d2efab9dc () apache ! org
[Download RAW message or body]

Severity: moderate

Affected versions:

- Apache Wicket 9.1.0 through 9.16.0
- Apache Wicket 10.0.0-M1 before 10.0.0

Description:

An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF \
protection in Apache Wicket. This issue affects Apache Wicket: from 9.1.0 through 9.16.0, and \
the milestone releases for the 10.0 series. Apache Wicket 8.x does not support CSRF protection \
via the fetch metadata headers and as such is not affected.

Users are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue.

Credit:

Jo Theunis (finder)

References:

https://wicket.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-27439


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic