|
Message-ID: <6ccac9f8-f0f8-680b-0c95-054a0602b128@apache.org> Date: Fri, 12 Jul 2024 12:12:11 +0000 From: Martin Tzvetanov Grigorov <mgrigorov@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-36522: Apache Wicket: Remote code execution via XSLT injection Severity: moderate Affected versions: - Apache Wicket 10.0.0-M1 through 10.0.0 - Apache Wicket 9.0.0 through 9.17.0 - Apache Wicket 8.0.0 through 8.15.0 Description: The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation. Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue. Credit: cigar (finder) References: https://wicket.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-36522
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.