Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <61e677d2-4c00-acba-de1b-6366983bef8b@meiers.net>
Date: Mon, 10 Aug 2020 18:24:20 +0200
From: svenmeier@...che.org
To: oss-security@...ts.openwall.com
Subject: [CVE-2020-11976] Apache Wicket information disclosure vulnerability

Severity: Important

Vendor:
The Apache Software Foundation

Versions Affected:
Apache Wicket 7.16.0, 8.8.0 and 9.0.0-M5

Description:

By crafting a special URL it is possible to make Wicket deliver 
unprocessed HTML templates.
This would allow an attacker to see possibly sensitive information 
inside a HTML template that is usually removed during rendering.
For example if there are credentials in the markup which are never 
supposed to be visible to the client:

   <wicket:remove>
      some secret
   </wicket:remove>

The application developers are recommended to upgrade to:
- Apache Wicket 7.17.0
<http://wicket.apache.org/news/2020/07/20/wicket-7.17.0-released.html>
- Apache Wicket 8.9.0
<http://wicket.apache.org/news/2020/07/15/wicket-8.9.0-released.html>
- Apache Wicket 9.0.0
<http://wicket.apache.org/news/2020/07/15/wicket-9-released.html>

Credit:
The vulnerability has been found and reported by Mariusz Popławski from 
Afine.

Apache Wicket Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.