Full Disclosure mailing list archives

[CVE-2013-2055] Apache Wicket information disclosure vulnerability


From: Martin Grigorov <mgrigorov () apache org>
Date: Thu, 6 Feb 2014 10:39:20 +0100

Severity: Important

Vendor:
The Apache Software Foundation

Affected versions:
Apache Wicket 1.4.22, 1.5.10 and 6.7.0

Description CVE-2013-2055<https://wicket.apache.org/2014/02/06/cve-2013-2055.html>
:

It is possible to make Wicket deliver the HTML templates in their
raw/non-processed form.
An attacker could see any sensitive information in the part of the HTML
template that is usually ignored during rendering.
For example if there is sensitive information before or after the Wicket
Panel/Border's markup:

[something sensitive here 1]
<wicket:panel>
   [real application code]
</wicket:panel>
[something sensitive here 2]

Usually Wicket will render only the [real application code] part but by
exploiting this vulnerability an attacker can see also the code with the
sensitive information.

The application developers are recommended to upgrade to:
- Apache Wicket
1.4.23<https://wicket.apache.org/2014/02/06/wicket-1.4.23-released.html>
- Apache Wicket
1.5.11<https://wicket.apache.org/2014/02/06/wicket-1.5.11-released.html>
- Apache Wicket
6.8.0<https://wicket.apache.org/2013/05/17/wicket-6.8.0-released.html>

and/or to remove any sensitive information in the HTML templates.

Apache Wicket Team
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: