2024-07-14 02:06:08 +00:00

45 lines
1.8 KiB
JSON

{
"id": "CVE-2024-27439",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-19T11:15:06.537",
"lastModified": "2024-05-01T18:15:16.380",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket.\nThis issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series.\nApache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected.\n\nUsers are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue.\n\n"
},
{
"lang": "es",
"value": "Un error en la evaluaci\u00f3n de los encabezados de metadatos de recuperaci\u00f3n podr\u00eda permitir eludir la protecci\u00f3n CSRF en Apache Wicket. Este problema afecta a Apache Wicket: desde 9.1.0 hasta 9.16.0 y los lanzamientos importantes para la serie 10.0. Apache Wicket 8.x no admite la protecci\u00f3n CSRF a trav\u00e9s de los encabezados de metadatos de recuperaci\u00f3n y, como tal, no se ve afectado. Se recomienda a los usuarios actualizar a la versi\u00f3n 9.17.0 o 10.0.0, que soluciona el problema."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-444"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/19/2",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/o825rvjjtmz3qv21ps5k7m2w9193g1lo",
"source": "security@apache.org"
}
]
}