org.apache.wicket:wicket-core@1.5.2 vulnerabilities

  • latest version

    10.3.0

  • latest non vulnerable version

  • first published

    14 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.wicket:wicket-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    org.apache.wicket:wicket-core Multiple cross-site scripting (XSS) vulnerabilities in the (1) RadioGroup and (2) CheckBoxMultipleChoice classes in Apache Wicket 1.5.x before 1.5.15, 6.x before 6.22.0, and 7.x before 7.2.0 allow remote attackers to inject arbitrary web script or HTML via a crafted "value" attribute in a <input> element.

    [1.5.0,1.5.15)[6.0.0,6.22.0)[7.0.0,7.2.0)
    • M
    Information Exposure

    org.apache.wicket:wicket-core Affected versions of the package are vulnerable to Information Exposure. By issuing requests to special urls handled by Wicket it is possible to check for the existence of particular classes in the classpath and thus check whether a third party library with a known security vulnerability is in use.

    [,1.5.11)[6.0.0,6.14.0)
    • H
    Inadequate Encryption Strength

    org.apache.wicket:wicket-core Affected versions of the package are vulnerable to Inadequate Encryption Strength. With Wicket's default security settings the usage of CryptoMapper to encrypt/obfuscate pages' urls is not strong enough. It is possible to predict the encrypted version of an url based on the previous history.

    [,1.5.13)[6.0.0,6.19.0)[7-alpha,7.0.0-M5)
    • H
    Information Exposure

    org.apache.wicket:wicket-core Affected versions of the package are vulnerable to Information Exposure during the Session Handling process.

    [,1.5.12)[6.0.0,6.16.0)[7-alpha,7.0.0-M3)
    • M
    Directory Traversal

    org.apache.wicket:wicket-core Directory traversal vulnerability in Apache Wicket 1.4.x before 1.4.20 and 1.5.x before 1.5.5 allows remote attackers to read arbitrary web-application files via a relative pathname in a URL for a Wicket resource that corresponds to a null package.

    [1.5.0,1.5.5)
    • M
    Information Exposure

    org.apache.wicket:wicket-core Unspecified vulnerability in Apache Wicket 1.4.x before 1.4.23, 1.5.x before 1.5.11, and 6.x before 6.8.0 allows remote attackers to obtain sensitive information via vectors that cause raw HTML templates to be rendered without being processed and reading the information that is outside of wicket:panel markup.

    [1.5.0,1.5.11)[6.0.0,6.8.0)