Arbitrary Command Execution Affecting org.apache.wicket:wicket-util package, versions [,8.16.0) [9.0.0,9.18.0) [10.0.0-M1,10.1.0)
Threat Intelligence
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHEWICKET-7448451
- published 14 Jul 2024
- disclosed 12 Jul 2024
- credit cigar
Introduced: 12 Jul 2024
CVE-2024-36522 Open this link in a new tabHow to fix?
Upgrade org.apache.wicket:wicket-util
to version 8.16.0, 9.18.0, 10.1.0 or higher.
Overview
org.apache.wicket:wicket-util is a Component-based Java web framework.
Affected versions of this package are vulnerable to Arbitrary Command Execution via XSLT injection in XSLTResourceStream.java
, which does not set FEATURE_SECURE_PROCESSING
by default.
Exploiting this vulnerability is possible when processing input from an untrusted source without validation.