SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Apache Wicket Vendors:   Apache Software Foundation
Apache Wicket DiskFileItem Class Deserialization Error Lets Remote Users Cause Denial of Service Conditions
SecurityTracker Alert ID:  1037541
SecurityTracker URL:  http://securitytracker.com/id/1037541
CVE Reference:   CVE-2016-6793   (Links to External Site)
Date:  Jan 1 2017
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.5.x, 6.x
Description:   A vulnerability was reported in Apache Wicket. A remote user can cause denial of service conditions.

A remote user can send specially crafted data to trigger a deserialization error in the DiskFileItem class and cause the target Wicket application to enter an infinite loop when the client attempts to write on the DeferredFileOutputStream attribute.

The impact depends on the ISerializer set in the target Wicket application.

Jacob Baines, Tenable Network Security, and Pedro Santos reported this vulnerability.

Impact:   A remote user can cause the target application to enter an infinite loop.
Solution:   The vendor has issued a fix (1.5.17, 6.25.0).

The vendor advisory is available at:

https://wicket.apache.org/news/2016/12/31/cve-2016-6793.html

Vendor URL:  wicket.apache.org/news/2016/12/31/cve-2016-6793.html (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Date:  Sat, 31 Dec 2016 05:38:20 -0200
Subject:  [oss-security] Fwd: [ANNOUNCE] CVE-2016-6793 Apache Wicket deserialization vulnerability

Forwarding the message em plain text mode to:

- be accepted by securityfocus's mail server ( didn't accepted MIME
Content-Type 'multipart/alternative' )
- add oss-security@lists.openwall.com at the open receiver ( openwall
is not accepting emails if in BCC)
- adding missing Apache's security team (my bad, missed in the original email)

Pedro Santos

---------- Forwarded message ----------
From: Pedro Santos <pedro@apache.org>
Date: Sat, Dec 31, 2016 at 5:21 AM
Subject: [ANNOUNCE] CVE-2016-6793 Apache Wicket deserialization vulnerability
To: announce@wicket.apache.org, "users@wicket.apache.org"
<users@wicket.apache.org>, dev@wicket.apache.org


CVE-2016-6793: Apache Wicket deserialization vulnerability

Severity: Low

Vendor: The Apache Software Foundation

Versions Affected: Apache Wicket 6.x and 1.5.x

Description: Depending on the ISerializer set in the Wicket
application, it's possible that a Wicket's object deserialized from an
untrusted source and utilized by the application to causes the code to
enter in an infinite loop. Specifically, Wicket's DiskFileItem class,
serialized by Kryo, allows an attacker to hack its serialized form to
put a client on an infinite loop if the client attempts to write on
the DeferredFileOutputStream attribute.

Mitigation: Upgrade to Apache Wicket 6.25.0 or 1.5.17

Credit: This issue was discovered by Jacob Baines, Tenable Network
Security and Pedro Santos

References: https://wicket.apache.org/news
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC