Cross-site Scripting (XSS)org.apache.wicket:wicket-core
Multiple cross-site scripting (XSS) vulnerabilities in the (1) RadioGroup and (2) CheckBoxMultipleChoice classes in Apache Wicket 1.5.x before 1.5.15, 6.x before 6.22.0, and 7.x before 7.2.0 allow remote attackers to inject arbitrary web script or HTML via a crafted "value" attribute in a <input> element.
| [1.5.0,1.5.15)[6.0.0,6.22.0)[7.0.0,7.2.0) |
Information Exposureorg.apache.wicket:wicket-core
Affected versions of the package are vulnerable to Information Exposure. By issuing requests to special urls handled by Wicket it is possible to check for the existence of particular classes in the classpath and thus check whether a third party library with a known security vulnerability is in use.
| |
Inadequate Encryption Strengthorg.apache.wicket:wicket-core
Affected versions of the package are vulnerable to Inadequate Encryption Strength. With Wicket's default security settings the usage of CryptoMapper to encrypt/obfuscate pages' urls is not strong enough. It is possible to predict the encrypted version of an url based on the previous history.
| [,1.5.13)[6.0.0,6.19.0)[7-alpha,7.0.0-M5) |
Information Exposure | [,1.5.12)[6.0.0,6.16.0)[7-alpha,7.0.0-M3) |
Directory Traversalorg.apache.wicket:wicket-core
Directory traversal vulnerability in Apache Wicket 1.4.x before 1.4.20 and 1.5.x before 1.5.5 allows remote attackers to read arbitrary web-application files via a relative pathname in a URL for a Wicket resource that corresponds to a null package.
| |
Information Exposureorg.apache.wicket:wicket-core
Unspecified vulnerability in Apache Wicket 1.4.x before 1.4.23, 1.5.x before 1.5.11, and 6.x before 6.8.0 allows remote attackers to obtain sensitive information via vectors that cause raw HTML templates to be rendered without being processed and reading the information that is outside of wicket:panel markup.
| [1.5.0,1.5.11)[6.0.0,6.8.0) |