First published: Fri Sep 15 2017(Updated: )
Apache Wicket before 1.5.13, 6.x before 6.19.0, and 7.x before 7.0.0-M5 make it easier for attackers to defeat a cryptographic protection mechanism and predict encrypted URLs by leveraging use of CryptoMapper as the default encryption provider.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Wicket | >=1.5.0<1.5.13 | |
Apache Wicket | >=6.0.0<6.19.0 | |
Apache Wicket | =7.0.0-milestone1 | |
Apache Wicket | =7.0.0-milestone2 | |
Apache Wicket | =7.0.0-milestone3 | |
Apache Wicket | =7.0.0-milestone4 | |
Apache Wicket | =7.0.0-milestone5 | |
maven/org.apache.wicket:wicket-core | >=7.0.0-M1<7.0.0-M5 | 7.0.0-M5 |
maven/org.apache.wicket:wicket-core | >=6.0.0-beta1<6.19.0 | 6.19.0 |
maven/org.apache.wicket:wicket-core | <1.5.13 | 1.5.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7808 has a moderate severity rating due to its impact on the cryptographic protection mechanisms in Apache Wicket.
To fix CVE-2014-7808, upgrade to Apache Wicket version 1.5.13, 6.19.0, or 7.0.0-M5 or later.
CVE-2014-7808 affects Apache Wicket versions prior to 1.5.13, 6.x before 6.19.0, and 7.x before 7.0.0-M5.
CVE-2014-7808 is a cryptographic vulnerability that allows attackers to predict encrypted URLs.
Developers and users of Apache Wicket versions prior to the patched releases are impacted by CVE-2014-7808.