CVE-2021-23937 – org.apache.wicket:wicket-core
Package
Manager: maven
Name: org.apache.wicket:wicket-core
Vulnerable Version: >=9.0.0 <9.3.0 || >=8.0.0 <8.12.0 || >=0 <7.18.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
EPSS: 0.06868 pctl0.90994
Details
DNS based denial of service in Apache Wicket A DNS proxy and possible amplification attack vulnerability in WebClientInfo of Apache Wicket allows an attacker to trigger arbitrary DNS lookups from the server when the X-Forwarded-For header is not properly sanitized. This DNS lookup can be engineered to overload an internal DNS server or to slow down request processing of the Apache Wicket application causing a possible denial of service on either the internal infrastructure or the web application itself. This issue affects Apache Wicket Apache Wicket 9.x version 9.2.0 and prior versions; Apache Wicket 8.x version 8.11.0 and prior versions; Apache Wicket 7.x version 7.17.0 and prior versions and Apache Wicket 6.x version 6.2.0 and later versions.
Metadata
Created: 2022-05-24T19:03:11Z
Modified: 2023-08-08T19:55:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-hmhg-95wh-r699/GHSA-hmhg-95wh-r699.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-hmhg-95wh-r699
Finding: F184
Auto approve: 1