GHSA-hhwc-gh8h-9rrp

Suggest an improvement
Source
https://github.com/advisories/GHSA-hhwc-gh8h-9rrp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-hhwc-gh8h-9rrp/GHSA-hhwc-gh8h-9rrp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-hhwc-gh8h-9rrp
Aliases
  • CVE-2024-36522
Published
2024-07-12T15:31:26Z
Modified
2024-12-07T05:32:44.574798Z
Summary
Apache Wicket: Remote code execution via XSLT injection
Details

The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation. Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.

Database specific
{
    "nvd_published_at": "2024-07-12T13:15:11Z",
    "cwe_ids": [
        "CWE-74"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-07-12T21:00:43Z"
}
References

Affected packages

Maven / org.apache.wicket:wicket-util

Package

Name
org.apache.wicket:wicket-util
View open source insights on deps.dev
Purl
pkg:maven/org.apache.wicket/wicket-util

Affected ranges

Type
ECOSYSTEM
Events
Introduced
10.0.0-M1
Fixed
10.1.0

Affected versions

10.*

10.0.0-M1
10.0.0-M2
10.0.0

Maven / org.apache.wicket:wicket-util

Package

Name
org.apache.wicket:wicket-util
View open source insights on deps.dev
Purl
pkg:maven/org.apache.wicket/wicket-util

Affected ranges

Type
ECOSYSTEM
Events
Introduced
9.0.0
Fixed
9.18.0

Affected versions

9.*

9.0.0
9.1.0
9.2.0
9.3.0
9.4.0
9.5.0
9.6.0
9.7.0
9.8.0
9.9.0
9.9.1
9.10.0
9.11.0
9.12.0
9.13.0
9.14.0
9.15.0
9.16.0
9.17.0

Maven / org.apache.wicket:wicket-util

Package

Name
org.apache.wicket:wicket-util
View open source insights on deps.dev
Purl
pkg:maven/org.apache.wicket/wicket-util

Affected ranges

Type
ECOSYSTEM
Events
Introduced
8.0.0
Fixed
8.16.0

Affected versions

8.*

8.0.0
8.1.0
8.2.0
8.3.0
8.4.0
8.5.0
8.6.0
8.6.1
8.7.0
8.8.0
8.9.0
8.10.0
8.11.0
8.12.0
8.13.0
8.14.0
8.15.0