CVE-2016-6806

Published on: 10/02/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:10 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of Wicket from Apache contain the following vulnerability:

Apache Wicket 6.x before 6.25.0, 7.x before 7.5.0, and 8.0.0-M1 provide a CSRF prevention measure that fails to discover some cross origin requests. The mitigation is to not only check the Origin HTTP header, but also take the Referer HTTP header into account when no Origin was provided. Furthermore, not all Wicket server side targets were subjected to the CSRF check. This was also fixed.

  • CVE-2016-6806 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Pony Mail! Mailing List
Vendor Advisory
lists.apache.org
text/html
URL Logo MLIST [wicket-announce] 20161108 CVE-2016-6806: Apache Wicket CSRF detection vulnerability

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationApacheWicket6.20.0AllAllAll
ApplicationApacheWicket6.21.0AllAllAll
ApplicationApacheWicket6.22.0AllAllAll
ApplicationApacheWicket6.23.0AllAllAll
ApplicationApacheWicket6.24.0AllAllAll
ApplicationApacheWicket7.0.0AllAllAll
ApplicationApacheWicket7.1.0AllAllAll
ApplicationApacheWicket7.2.0AllAllAll
ApplicationApacheWicket7.3.0AllAllAll
ApplicationApacheWicket7.4.0AllAllAll
ApplicationApacheWicket8.0.0m1AllAll
ApplicationApacheWicket6.20.0AllAllAll
ApplicationApacheWicket6.21.0AllAllAll
ApplicationApacheWicket6.22.0AllAllAll
ApplicationApacheWicket6.23.0AllAllAll
ApplicationApacheWicket6.24.0AllAllAll
ApplicationApacheWicket7.0.0AllAllAll
ApplicationApacheWicket7.1.0AllAllAll
ApplicationApacheWicket7.2.0AllAllAll
ApplicationApacheWicket7.3.0AllAllAll
ApplicationApacheWicket7.4.0AllAllAll
ApplicationApacheWicket8.0.0m1AllAll
  • cpe:2.3:a:apache:wicket:6.20.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:6.21.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:6.22.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:6.23.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:6.24.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:7.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:7.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:7.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:7.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:7.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:8.0.0:m1:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:6.20.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:6.21.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:6.22.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:6.23.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:6.24.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:7.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:7.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:7.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:7.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:7.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:wicket:8.0.0:m1:*:*:*:*:*:*: