Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-hhwc-gh8h-9rrp: Apache Wicket: Remote code execution via XSLT injection

The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation. Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.

ghsa
#vulnerability#web#apache#git#java#rce#maven

Skip to content

Navigation Menu

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • GitHub Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

  • Explore

    • Learning Pathways
    • White papers, Ebooks, Webinars
    • Customer Stories
    • Partners
    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    • Enterprise platform

      AI-powered developer platform

  • Pricing

Provide feedback

Saved searches****Use saved searches to filter your results more quickly

Sign up

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2024-36522

Apache Wicket: Remote code execution via XSLT injection

High severity GitHub Reviewed Published Jul 12, 2024 to the GitHub Advisory Database • Updated Jul 12, 2024

Package

maven org.apache.wicket:wicket-core (Maven)

Affected versions

>= 10.0.0-M1, < 10.1.0

>= 9.0.0, < 9.18.0

>= 8.0.0, < 8.16.0

Patched versions

10.1.0

9.18.0

8.16.0

Description

Published to the GitHub Advisory Database

Jul 12, 2024

Last updated

Jul 12, 2024

ghsa: Latest News

GHSA-pj33-75x5-32j4: RabbitMQ HTTP API's queue deletion endpoint does not verify that the user has a required permission