CVE-2024-53299

The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources. Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue.
References
Link Resource
https://lists.apache.org/thread/gyp2ht00c62827y0379lxh5dbx3hhho5 Mailing List Vendor Advisory
http://www.openwall.com/lists/oss-security/2025/01/22/12 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-01-23 09:15

Updated : 2025-06-27 19:41


NVD link : CVE-2024-53299

Mitre link : CVE-2024-53299

CVE.ORG link : CVE-2024-53299


JSON object : View

Products Affected

apache

  • wicket
CWE
CWE-400

Uncontrolled Resource Consumption