Apache Wicket: An attacker can intentionally trigger a memory leak
Critical severity
GitHub Reviewed
Published
Jan 23, 2025
to the GitHub Advisory Database
•
Updated Jan 23, 2025
Package
Affected versions
>= 7.0.0, < 9.19.0
>= 10.0.0, < 10.3.0
Patched versions
9.19.0
10.3.0
Description
Published by the National Vulnerability Database
Jan 23, 2025
Published to the GitHub Advisory Database
Jan 23, 2025
Reviewed
Jan 23, 2025
Last updated
Jan 23, 2025
The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources.
Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue.
References