Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <e408bcff-007b-ff57-b7d0-da67b6370a15@apache.org>
Date: Wed, 22 Jan 2025 22:43:04 +0000
From: Pedro Henrique Oliveira dos Santos <pedro@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-53299: Apache Wicket: An attacker can intentionally
 trigger a memory leak 

Severity: critical

Affected versions:

- Apache Wicket 7.0.0 through 7.18.*
- Apache Wicket 8.0.0-M1 through 8.16.*
- Apache Wicket 9.0.0-M1 through 9.18.*
- Apache Wicket 10.0.0-M1 through 10.2.*

Description:

The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources.
Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue.

Credit:

Pedro Santos (finder)

References:

https://wicket.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-53299

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.