|
Message-ID: <e408bcff-007b-ff57-b7d0-da67b6370a15@apache.org> Date: Wed, 22 Jan 2025 22:43:04 +0000 From: Pedro Henrique Oliveira dos Santos <pedro@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-53299: Apache Wicket: An attacker can intentionally trigger a memory leak Severity: critical Affected versions: - Apache Wicket 7.0.0 through 7.18.* - Apache Wicket 8.0.0-M1 through 8.16.* - Apache Wicket 9.0.0-M1 through 9.18.* - Apache Wicket 10.0.0-M1 through 10.2.* Description: The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources. Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue. Credit: Pedro Santos (finder) References: https://wicket.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-53299
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.