Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <6ccac9f8-f0f8-680b-0c95-054a0602b128@apache.org>
Date: Fri, 12 Jul 2024 12:12:11 +0000
From: Martin Tzvetanov Grigorov <mgrigorov@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-36522: Apache Wicket: Remote code execution via XSLT
 injection 

Severity: moderate

Affected versions:

- Apache Wicket 10.0.0-M1 through 10.0.0
- Apache Wicket 9.0.0 through 9.17.0
- Apache Wicket 8.0.0 through 8.15.0

Description:

The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation.
Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.

Credit:

cigar (finder)

References:

https://wicket.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-36522

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.