[Full-disclosure] [CVE-2012-1089] Apache Wicket serving of hidden files vulnerability
- From: Martin Grigorov <mgrigorov@xxxxxxxxxx>
- Date: Thu, 22 Mar 2012 11:52:30 +0200
The Apache Software Foundation
Apache Wicket 1.4.x and 1.5.x
It is possible to view the content of any file of a web application by
using an Url to a Wicket resource which resolves to a 'null' package.
With such a Url the attacker can request the content of any file by specifying
its relative path, i.e. the attacker must know the file name to be able to
Setup a custom org.apache.wicket.markup.html.IPackageResourceGuard that provides
a whitelist of allowed resources.
Since versions 1.4.20 and 1.5.5 Apache Wicket uses by default
org.apache.wicket.markup.html.SecurePackageResourceGuard with a preconfigured
list of allowed file extensions.
Either setup SecurePackageResourceGuard with code like:
SecurePackageResourceGuard guard = new SecurePackageResourceGuard();
or upgrade to Apache Wicket 1.4.20 or 1.5.5.
This issue was discovered by Sebastian van Erk.
Apache Wicket Team
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Prev by Date: [Full-disclosure] [CVE-2012-0047] Apache Wicket XSS vulnerability via pageMapName request parameter
- Next by Date: [Full-disclosure] CVE-2012-0037: OpenOffice.org data leakage vulnerability
- Previous by thread: [Full-disclosure] [CVE-2012-0047] Apache Wicket XSS vulnerability via pageMapName request parameter
- Next by thread: [Full-disclosure] CVE-2012-0037: OpenOffice.org data leakage vulnerability