Lucene search

K
cveApacheCVE-2024-27439
HistoryMar 19, 2024 - 11:15 a.m.

CVE-2024-27439

2024-03-1911:15:06
CWE-352
CWE-444
apache
web.nvd.nist.gov
39
cve-2024-27439
security
vulnerability
apache wicket
csrf
bypass
upgrade

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

9.0%

An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket.
This issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series.
Apache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected.

Users are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue.

Affected configurations

Vulners
Node
apachewicketRange9.16.0
OR
apachewicketRange10.0.0
VendorProductVersionCPE
apachewicket*cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache Wicket",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThanOrEqual": "9.16.0",
        "status": "affected",
        "version": "9.1.0",
        "versionType": "semver"
      },
      {
        "lessThan": "10.0.0",
        "status": "affected",
        "version": "10.0.0-M1",
        "versionType": "semver"
      }
    ]
  }
]

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

9.0%