Date: Sat, 31 Dec 2016 05:38:20 -0200 From: Pedro Santos <pedrosans@...il.com> To: oss-security@...ts.openwall.com, bugtraq@...urityfocus.com, security <security@...che.org> Subject: Fwd: [ANNOUNCE] CVE-2016-6793 Apache Wicket deserialization vulnerability Forwarding the message em plain text mode to: - be accepted by securityfocus's mail server ( didn't accepted MIME Content-Type 'multipart/alternative' ) - add oss-security@...ts.openwall.com at the open receiver ( openwall is not accepting emails if in BCC) - adding missing Apache's security team (my bad, missed in the original email) Pedro Santos ---------- Forwarded message ---------- From: Pedro Santos <pedro@...che.org> Date: Sat, Dec 31, 2016 at 5:21 AM Subject: [ANNOUNCE] CVE-2016-6793 Apache Wicket deserialization vulnerability To: announce@...ket.apache.org, "users@...ket.apache.org" <users@...ket.apache.org>, dev@...ket.apache.org CVE-2016-6793: Apache Wicket deserialization vulnerability Severity: Low Vendor: The Apache Software Foundation Versions Affected: Apache Wicket 6.x and 1.5.x Description: Depending on the ISerializer set in the Wicket application, it's possible that a Wicket's object deserialized from an untrusted source and utilized by the application to causes the code to enter in an infinite loop. Specifically, Wicket's DiskFileItem class, serialized by Kryo, allows an attacker to hack its serialized form to put a client on an infinite loop if the client attempts to write on the DeferredFileOutputStream attribute. Mitigation: Upgrade to Apache Wicket 6.25.0 or 1.5.17 Credit: This issue was discovered by Jacob Baines, Tenable Network Security and Pedro Santos References: https://wicket.apache.org/news
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ