CVE-2024-27439

An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket. This issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series. Apache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected. Users are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue.
CVSS

No CVSS.

Configurations

No configuration.

History

21 Nov 2024, 09:04

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/03/19/2 - () http://www.openwall.com/lists/oss-security/2024/03/19/2 -
References () https://lists.apache.org/thread/o825rvjjtmz3qv21ps5k7m2w9193g1lo - () https://lists.apache.org/thread/o825rvjjtmz3qv21ps5k7m2w9193g1lo -

01 May 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/03/19/2 -
Summary
  • (es) Un error en la evaluación de los encabezados de metadatos de recuperación podría permitir eludir la protección CSRF en Apache Wicket. Este problema afecta a Apache Wicket: desde 9.1.0 hasta 9.16.0 y los lanzamientos importantes para la serie 10.0. Apache Wicket 8.x no admite la protección CSRF a través de los encabezados de metadatos de recuperación y, como tal, no se ve afectado. Se recomienda a los usuarios actualizar a la versión 9.17.0 o 10.0.0, que soluciona el problema.

19 Mar 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-19 11:15

Updated : 2024-11-21 09:04


NVD link : CVE-2024-27439

Mitre link : CVE-2024-27439

CVE.ORG link : CVE-2024-27439


JSON object : View

Products Affected

No product.

CWE
CWE-352

Cross-Site Request Forgery (CSRF)

CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')