First published: Wed Jan 22 2025(Updated: )
The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources. Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Wicket | <9.19.0<10.3.0 | |
maven/org.apache.wicket:wicket-core | >=10.0.0<10.3.0 | 10.3.0 |
maven/org.apache.wicket:wicket-core | >=7.0.0<9.19.0 | 9.19.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53299 has been categorized as a denial-of-service vulnerability.
To fix CVE-2024-53299, upgrade Apache Wicket to version 9.19.0 or 10.3.0.
CVE-2024-53299 affects Apache Wicket versions prior to 9.19.0 and between 7.0.0 and 10.3.0.
CVE-2024-53299 allows attackers to perform denial-of-service attacks by sending multiple requests to server resources.
CVE-2024-53299 is considered serious as it can disrupt service availability.