FKIE_CVE-2014-3526
Vulnerability from fkie_nvd - Published: 2017-10-30 14:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
Apache Wicket before 1.5.12, 6.x before 6.17.0, and 7.x before 7.0.0-M3 might allow remote attackers to obtain sensitive information via vectors involving identifiers for storing page markup for temporary user sessions.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://wicket.apache.org/news/2014/09/22/cve-2014-3526.html | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://wicket.apache.org/news/2014/09/22/cve-2014-3526.html | Issue Tracking, Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| apache | wicket | * | |
| apache | wicket | 6.0.0 | |
| apache | wicket | 6.0.0 | |
| apache | wicket | 6.0.0 | |
| apache | wicket | 6.0.0 | |
| apache | wicket | 6.1.0 | |
| apache | wicket | 6.1.1 | |
| apache | wicket | 6.2.0 | |
| apache | wicket | 6.3.0 | |
| apache | wicket | 6.4.0 | |
| apache | wicket | 6.5.0 | |
| apache | wicket | 6.6.0 | |
| apache | wicket | 6.7.0 | |
| apache | wicket | 6.8.0 | |
| apache | wicket | 6.9.0 | |
| apache | wicket | 6.9.1 | |
| apache | wicket | 6.10.0 | |
| apache | wicket | 6.11.0 | |
| apache | wicket | 6.12.0 | |
| apache | wicket | 6.13.0 | |
| apache | wicket | 6.14.0 | |
| apache | wicket | 6.15.0 | |
| apache | wicket | 6.16.0 | |
| apache | wicket | 7.0.0 | |
| apache | wicket | 7.0.0 | |
| apache | wicket | 7.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD671FB-9967-4ADA-8152-10DEA64F8BB7",
"versionEndExcluding": "1.5.12",
"versionStartIncluding": "1.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C2287A-F526-44C4-AD1D-0BE7857C1FC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "BC22417A-E4B0-4512-8D96-210782855FFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "C594BC43-D6BE-41A8-A307-0166C3DE71A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "8F160D55-152E-4CA4-A506-E91079D94D10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FF725E92-BAB8-4A0D-925B-AD4F6065E1D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C61C7A6-3233-4710-92B6-46562AF18479",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "330AA15C-8A05-4302-AD8A-54DE6015642F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "18F7EBAA-BE71-43C6-8F28-B23511B88402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A9D513BF-CC50-4F96-8926-55081BF98EDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCDA2F5-3C16-4093-81BD-EAB43A804419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE30441-B145-4860-AD95-DF20AB4D8DFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "710697FA-A859-4E66-B3A2-5A03AB21B1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C5A33E3-166A-41CE-8542-7AEEEC8DB42D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "94072681-D452-4068-813E-191F3306FDEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6B821243-5C36-4B54-8180-C88740B2D58F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83F52DED-EC06-42F9-B851-7E99B0D74851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74E55244-D41E-48CB-BF65-67F5FE17A703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7EFD25C8-EBEA-40D0-8D38-23770EA010AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51C6F793-FC42-4189-ACB7-E4CC5BEFA7B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF63DDD-3909-495D-A7CF-514A19ED04DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F7396595-B40E-41CB-AAD8-6777A3FF5938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:6.16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4BB87904-83A0-42B6-A3B1-57F8A91847A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "455D1DE8-2794-458C-AEBB-C957701E511D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:7.0.0:milestone1:*:*:*:*:*:*",
"matchCriteriaId": "AADF9D31-21F8-45AD-8B85-86244D4529F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:wicket:7.0.0:milestone2:*:*:*:*:*:*",
"matchCriteriaId": "B6A90E52-0EF7-4C84-814F-9D6EE832C535",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache Wicket before 1.5.12, 6.x before 6.17.0, and 7.x before 7.0.0-M3 might allow remote attackers to obtain sensitive information via vectors involving identifiers for storing page markup for temporary user sessions."
},
{
"lang": "es",
"value": "Apache Wicket en versiones anteriores a la 1.5.12, las versiones 6.x anteriores a la 6.17.0 y las versiones 7.x anteriores a la 7.0.0-M3 podr\u00eda permitir que atacantes remotos obtengan informaci\u00f3n sensible mediante vectores relacionados con identificadores para almacenar etiquetas de p\u00e1gina para sesiones de usuario temporales."
}
],
"id": "CVE-2014-3526",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-10-30T14:29:00.500",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://wicket.apache.org/news/2014/09/22/cve-2014-3526.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://wicket.apache.org/news/2014/09/22/cve-2014-3526.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…