36 lines
1.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-27439",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-19T11:15:06.537",
"lastModified": "2024-03-19T11:15:06.537",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket.\nThis issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series.\nApache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected.\n\nUsers are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-444"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/o825rvjjtmz3qv21ps5k7m2w9193g1lo",
"source": "security@apache.org"
}
]
}