- be accepted by securityfocus's mail server ( didn't accepted MIME
Content-Type 'multipart/alternative' )
- add oss-security (at) lists.openwall (dot) com [email concealed] at the open receiver ( openwall
is not accepting emails if in BCC)
- adding missing Apache's security team (my bad, missed in the original email)
Pedro Santos
---------- Forwarded message ----------
From: Pedro Santos <pedro (at) apache (dot) org [email concealed]>
Date: Sat, Dec 31, 2016 at 5:21 AM
Subject: [ANNOUNCE] CVE-2016-6793 Apache Wicket deserialization vulnerability
To: announce (at) wicket.apache (dot) org [email concealed], "users (at) wicket.apache (dot) org [email concealed]"
<users (at) wicket.apache (dot) org [email concealed]>, dev (at) wicket.apache (dot) org [email concealed]
Description: Depending on the ISerializer set in the Wicket
application, it's possible that a Wicket's object deserialized from an
untrusted source and utilized by the application to causes the code to
enter in an infinite loop. Specifically, Wicket's DiskFileItem class,
serialized by Kryo, allows an attacker to hack its serialized form to
put a client on an infinite loop if the client attempts to write on
the DeferredFileOutputStream attribute.
Mitigation: Upgrade to Apache Wicket 6.25.0 or 1.5.17
Credit: This issue was discovered by Jacob Baines, Tenable Network
Security and Pedro Santos
- be accepted by securityfocus's mail server ( didn't accepted MIME
Content-Type 'multipart/alternative' )
- add oss-security (at) lists.openwall (dot) com [email concealed] at the open receiver ( openwall
is not accepting emails if in BCC)
- adding missing Apache's security team (my bad, missed in the original email)
Pedro Santos
---------- Forwarded message ----------
From: Pedro Santos <pedro (at) apache (dot) org [email concealed]>
Date: Sat, Dec 31, 2016 at 5:21 AM
Subject: [ANNOUNCE] CVE-2016-6793 Apache Wicket deserialization vulnerability
To: announce (at) wicket.apache (dot) org [email concealed], "users (at) wicket.apache (dot) org [email concealed]"
<users (at) wicket.apache (dot) org [email concealed]>, dev (at) wicket.apache (dot) org [email concealed]
CVE-2016-6793: Apache Wicket deserialization vulnerability
Severity: Low
Vendor: The Apache Software Foundation
Versions Affected: Apache Wicket 6.x and 1.5.x
Description: Depending on the ISerializer set in the Wicket
application, it's possible that a Wicket's object deserialized from an
untrusted source and utilized by the application to causes the code to
enter in an infinite loop. Specifically, Wicket's DiskFileItem class,
serialized by Kryo, allows an attacker to hack its serialized form to
put a client on an infinite loop if the client attempts to write on
the DeferredFileOutputStream attribute.
Mitigation: Upgrade to Apache Wicket 6.25.0 or 1.5.17
Credit: This issue was discovered by Jacob Baines, Tenable Network
Security and Pedro Santos
References: https://wicket.apache.org/news
[ reply ]