The DiskFileItem class in Apache Wicket 6.x before 6.25.0 and 1.5.x before 1.5.17 allows remote attackers to cause a denial of service (infinite loop) and write to, move, and delete files with the permissions of DiskFileItem, and if running on a Java VM before 1.3.1, execute arbitrary code via a crafted serialized Java object.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2016-23 | Third Party Advisory |
https://wicket.apache.org/news/2016/12/31/cve-2016-6793.html | Vendor Advisory |
http://www.securitytracker.com/id/1037541 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/95168 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2016/12/31/1 | Mailing List Third Party Advisory |
http://www.securityfocus.com/archive/1/539975/100/0/threaded | Mailing List Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-07-17 06:18
Updated : 2019-05-06 12:15
NVD link : CVE-2016-6793
Mitre link : CVE-2016-6793
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
apache
- wicket