|
Message-ID: <61e677d2-4c00-acba-de1b-6366983bef8b@meiers.net> Date: Mon, 10 Aug 2020 18:24:20 +0200 From: svenmeier@...che.org To: oss-security@...ts.openwall.com Subject: [CVE-2020-11976] Apache Wicket information disclosure vulnerability Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache Wicket 7.16.0, 8.8.0 and 9.0.0-M5 Description: By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. For example if there are credentials in the markup which are never supposed to be visible to the client: <wicket:remove> some secret </wicket:remove> The application developers are recommended to upgrade to: - Apache Wicket 7.17.0 <http://wicket.apache.org/news/2020/07/20/wicket-7.17.0-released.html> - Apache Wicket 8.9.0 <http://wicket.apache.org/news/2020/07/15/wicket-8.9.0-released.html> - Apache Wicket 9.0.0 <http://wicket.apache.org/news/2020/07/15/wicket-9-released.html> Credit: The vulnerability has been found and reported by Mariusz Popławski from Afine. Apache Wicket Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.