First published: Tue Apr 12 2016(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the (1) RadioGroup and (2) CheckBoxMultipleChoice classes in Apache Wicket 1.5.x before 1.5.15, 6.x before 6.22.0, and 7.x before 7.2.0 allow remote attackers to inject arbitrary web script or HTML via a crafted "value" attribute in a <input> element.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Wicket | >=1.5.0<1.5.15 | |
Apache Wicket | >=6.0.0<6.22.0 | |
Apache Wicket | >=7.0.0<7.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7520 is classified as a high severity vulnerability due to its potential for exploitation via cross-site scripting.
To fix CVE-2015-7520, upgrade Apache Wicket to version 1.5.15, 6.22.0, or 7.2.0 or later.
CVE-2015-7520 allows remote attackers to perform cross-site scripting (XSS) attacks by injecting arbitrary web script or HTML.
Apache Wicket versions 1.5.x before 1.5.15, 6.x before 6.22.0, and 7.x before 7.2.0 are impacted by CVE-2015-7520.
Yes, CVE-2015-7520 can be exploited easily if the vulnerable components are present in web applications.