You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@directory.apache.org by "Shawn McKinney (Jira)" <ji...@apache.org> on 2021/06/26 13:47:00 UTC

[jira] [Resolved] (FC-293) [fortress-web] CVE-2020-11976

     [ https://issues.apache.org/jira/browse/FC-293?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Shawn McKinney resolved FC-293.
-------------------------------
    Resolution: Fixed

> [fortress-web] CVE-2020-11976
> -----------------------------
>
>                 Key: FC-293
>                 URL: https://issues.apache.org/jira/browse/FC-293
>             Project: FORTRESS
>          Issue Type: Improvement
>    Affects Versions: 2.0.5
>            Reporter: Shawn McKinney
>            Assignee: Shawn McKinney
>            Priority: Major
>             Fix For: 2.0.6
>
>
> h5. [CVE-2020-11976|https://github.com/advisories/GHSA-64gv-3pqv-299h]
>  high severity 
> *Vulnerable versions:* >= 8.0.0, < 8.9.0
> *Patched version:* 8.9.0
> By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@directory.apache.org
For additional commands, e-mail: dev-help@directory.apache.org