Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:3181
HistoryDec 28, 2016 - 8:54 a.m.

Remote File Manipulation Via Deserialization

2016-12-2808:54:38
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
7

0.021 Low

EPSS

Percentile

89.2%

Apache Wicket is vulnerable to remote file manipulation via Java deserialization. It allows an attacker to add, move, and delete files that Apache DiskFileItem has access to. Additionally, if an older Java VM is running, the attacker can control the filename because the NULL byte check doesn’t exist. In that case, the ability to name and place a custom file can lead to remote code execution.

CPENameOperatorVersion
wicket utille6.23.0
wicket utille1.5.15

0.021 Low

EPSS

Percentile

89.2%

Related for VERACODE:3181