Repository: wicket-site
Updated Branches:
  refs/heads/asf-site 8c4a5a553 -> 1f9ec1bfe


Add entry for CVE-2015-7520


Project: http://git-wip-us.apache.org/repos/asf/wicket-site/repo
Commit: http://git-wip-us.apache.org/repos/asf/wicket-site/commit/1f9ec1bf
Tree: http://git-wip-us.apache.org/repos/asf/wicket-site/tree/1f9ec1bf
Diff: http://git-wip-us.apache.org/repos/asf/wicket-site/diff/1f9ec1bf

Branch: refs/heads/asf-site
Commit: 1f9ec1bfe6bd8dcd7da2b23ea4eb895117541fae
Parents: 8c4a5a5
Author: Martin Tzvetanov Grigorov <[email protected]>
Authored: Wed Mar 2 16:00:33 2016 +0100
Committer: Martin Tzvetanov Grigorov <[email protected]>
Committed: Wed Mar 2 16:00:33 2016 +0100

----------------------------------------------------------------------
 _posts/2016/2016-03-02-cve-2015-7520.md    |  30 +++
 content/atom.xml                           | 271 ++++--------------------
 content/index.html                         |  27 ++-
 content/learn/index.html                   |   6 +-
 content/news/2016/03/02/cve-2015-7520.html |  84 ++++++++
 content/news/2016/03/index.html            |  12 ++
 content/news/2016/index.html               |   6 +
 content/news/index.html                    |   6 +
 8 files changed, 193 insertions(+), 249 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/wicket-site/blob/1f9ec1bf/_posts/2016/2016-03-02-cve-2015-7520.md
----------------------------------------------------------------------
diff --git a/_posts/2016/2016-03-02-cve-2015-7520.md 
b/_posts/2016/2016-03-02-cve-2015-7520.md
new file mode 100644
index 0000000..d117dc4
--- /dev/null
+++ b/_posts/2016/2016-03-02-cve-2015-7520.md
@@ -0,0 +1,30 @@
+---
+layout: post
+title: CVE-2015-7520 Apache Wicket XSS vulnerability
+---
+
+Severity: Important
+
+Vendor:
+The Apache Software Foundation
+
+Versions Affected:
+Apache Wicket 1.5.x, 6.x and 7.x
+
+Description:
+
+It is possible for JavaScript statements to break out of a RadioGroup's 
+and CheckBoxMultipleChoice's "value" attribute of &lt;input&gt; elements
+
+This might pose a security threat if the written JavaScript contains user 
provided data.
+
+## The application developers are recommended to upgrade to: 
+    
+* [Apache Wicket 1.5.15](/news/2016/02/19/wicket-1.5.15-released.html)
+* [Apache Wicket 6.22.0](/news/2016/02/19/wicket-6.22.0-released.html)
+* [Apache Wicket 7.2.0](/news/2016/01/20/wicket-7.2.0-released.html)
+
+Credit:
+This issue was reported by Canh Ngo!
+
+Apache Wicket Team
\ No newline at end of file

http://git-wip-us.apache.org/repos/asf/wicket-site/blob/1f9ec1bf/content/atom.xml
----------------------------------------------------------------------
diff --git a/content/atom.xml b/content/atom.xml
index b3b570e..51ac905 100644
--- a/content/atom.xml
+++ b/content/atom.xml
@@ -3,7 +3,7 @@
     <title>Apache Wicket</title>
     <link href="http://wicket.apache.org/atom.xml"; rel="self"/>
     <link href="http://wicket.apache.org/"/>
-    <updated>2016-03-02T15:51:44+01:00</updated>
+    <updated>2016-03-02T15:59:59+01:00</updated>
     <id>http://wicket.apache.org/</id>
     <author>
         <name>Apache Wicket</name>
@@ -12,6 +12,41 @@
  
 
     <entry>
+        <title>CVE-2015-7520 Apache Wicket XSS vulnerability</title>
+        <link 
href="http://wicket.apache.org/news/2016/03/02/cve-2015-7520.html"/>
+        <updated>2016-03-02T00:00:00+01:00</updated>
+        <id>http://wicket.apache.org/news/2016/03/02/cve-2015-7520</id>
+        <content type="html">&lt;p&gt;Severity: Important&lt;/p&gt;
+
+&lt;p&gt;Vendor:
+The Apache Software Foundation&lt;/p&gt;
+
+&lt;p&gt;Versions Affected:
+Apache Wicket 1.5.x, 6.x and 7.x&lt;/p&gt;
+
+&lt;p&gt;Description:&lt;/p&gt;
+
+&lt;p&gt;It is possible for JavaScript statements to break out of a 
RadioGroup’s 
+and CheckBoxMultipleChoice’s “value” attribute of &amp;lt;input&amp;gt; 
elements&lt;/p&gt;
+
+&lt;p&gt;This might pose a security threat if the written JavaScript contains 
user provided data.&lt;/p&gt;
+
+&lt;h2 
id=&quot;the-application-developers-are-recommended-to-upgrade-to&quot;&gt;The 
application developers are recommended to upgrade to:&lt;/h2&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;a 
href=&quot;/news/2016/02/19/wicket-1.5.15-released.html&quot;&gt;Apache Wicket 
1.5.15&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a 
href=&quot;/news/2016/02/19/wicket-6.22.0-released.html&quot;&gt;Apache Wicket 
6.22.0&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a 
href=&quot;/news/2016/01/20/wicket-7.2.0-released.html&quot;&gt;Apache Wicket 
7.2.0&lt;/a&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;Credit:
+This issue was reported by Canh Ngo!&lt;/p&gt;
+
+&lt;p&gt;Apache Wicket Team&lt;/p&gt;
+</content>
+    </entry>
+
+    <entry>
         <title>CVE-2015-5347 Apache Wicket XSS vulnerability</title>
         <link 
href="http://wicket.apache.org/news/2016/03/01/cve-2015-5347.html"/>
         <updated>2016-03-01T00:00:00+01:00</updated>
@@ -76,10 +111,10 @@ update any other dependencies on Wicket projects to the 
same version):&lt;/p&gt;
 &lt;p&gt;Or download and build the distribution yourself, or use our
 convenience binary package&lt;/p&gt;
 
-&lt;div class=&quot;highlight&quot;&gt;&lt;pre&gt;
- * Source: http://www.apache.org/dyn/closer.cgi/wicket/6.22.0
- * Binaries: http://www.apache.org/dyn/closer.cgi/wicket/6.22.0/binaries
-&lt;/pre&gt;&lt;/div&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;a 
href=&quot;http://www.apache.org/dyn/closer.cgi/wicket/6.22.0&quot;&gt;Sources&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a 
href=&quot;http://www.apache.org/dyn/closer.cgi/wicket/6.22.0/binaries&quot;&gt;Binaries&lt;/a&gt;&lt;/li&gt;
+&lt;/ul&gt;
 
 &lt;h3 id=&quot;upgrading-from-earlier-versions&quot;&gt;Upgrading from 
earlier versions&lt;/h3&gt;
 
@@ -704,230 +739,4 @@ All other brands and trademarks are the property of their 
respective owners.&lt;
 </content>
     </entry>
 
-    <entry>
-        <title>Apache Wicket 7.0.0-M6 released</title>
-        <link 
href="http://wicket.apache.org/news/2015/06/21/wicket-7.0.0-M6-released.html"/>
-        <updated>2015-06-21T00:00:00+02:00</updated>
-        
<id>http://wicket.apache.org/news/2015/06/21/wicket-7.0.0-M6-released</id>
-        <content type="html">&lt;p&gt;The Apache Wicket PMC is proud to 
announce Apache Wicket 7.0.0-M6!&lt;/p&gt;
-
-&lt;p&gt;We have released another milestone release for Apache Wicket 7. We aim
-to finalise Wicket 7 over the coming months and request your help in
-testing the new major version.&lt;/p&gt;
-
-&lt;h3 id=&quot;caveats&quot;&gt;Caveats&lt;/h3&gt;
-
-&lt;p&gt;It is still a development version so expect API breaks to happen over
-the course of the coming milestone releases.&lt;/p&gt;
-
-&lt;h3 id=&quot;semantic-versioning&quot;&gt;Semantic versioning&lt;/h3&gt;
-
-&lt;p&gt;As we adopted semver Wicket 7 will be the first release since 6.0 
where
-we are able to refactor the API. We will continue to use semver when we
-have made Wicket 7 final and maintain api compatibility between minor
-versions of Wicket 7.&lt;/p&gt;
-
-&lt;h3 id=&quot;requirements&quot;&gt;Requirements&lt;/h3&gt;
-
-&lt;p&gt;Wicket 7 requires the following:&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;Java 7&lt;/li&gt;
-  &lt;li&gt;Servlet 3 compatible container&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;p&gt;You can’t mix wicket libraries from prior Wicket versions with 
Wicket 7.&lt;/p&gt;
-
-&lt;h3 id=&quot;migration-guide&quot;&gt;Migration guide&lt;/h3&gt;
-
-&lt;p&gt;As usual we have a migration guide available online for people
-migrating their applications to Wicket 7. We will continue to update
-the guide as development progresses. If you find something that is not
-in the guide, please update the guide, or let us know so we can update
-the guide.&lt;/p&gt;
-
-&lt;p&gt;You can find the guide here: &lt;a 
href=&quot;http://s.apache.org/wicket7migrate&quot;&gt;http://s.apache.org/wicket7migrate&lt;/a&gt;&lt;/p&gt;
-
-&lt;h3 id=&quot;new-and-noteworthy&quot;&gt;New and noteworthy&lt;/h3&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;New inline image support for the new data: protocol. See
-http://ci.apache.org/projects/wicket/apidocs/6.x/org/apache/wicket/markup/html/image/InlineImage.html
-for more information.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;Added CSRF prevention measure to Wicket. The
-CsrfPreventionRequestCycleListener
-(http://ci.apache.org/projects/wicket/apidocs/6.x/org/apache/wicket/protocol/http/CsrfPreventionRequestCycleListener.html)
-will prevent requests coming from other origins than allowed from
-performing actions. See the JavaDoc for more information on this
-listener.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;JQuery was upgraded to most recent version.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id=&quot;using-this-release&quot;&gt;Using this release&lt;/h3&gt;
-
-&lt;p&gt;With Apache Maven update your dependency to (and don’t forget to
-update any other dependencies on Wicket projects to the same 
version):&lt;/p&gt;
-
-&lt;figure class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code 
class=&quot;language-xml&quot; data-lang=&quot;xml&quot;&gt;&lt;span 
class=&quot;nt&quot;&gt;&amp;lt;dependency&amp;gt;&lt;/span&gt;
-    &lt;span 
class=&quot;nt&quot;&gt;&amp;lt;groupId&amp;gt;&lt;/span&gt;org.apache.wicket&lt;span
 class=&quot;nt&quot;&gt;&amp;lt;/groupId&amp;gt;&lt;/span&gt;
-    &lt;span 
class=&quot;nt&quot;&gt;&amp;lt;artifactId&amp;gt;&lt;/span&gt;wicket-core&lt;span
 class=&quot;nt&quot;&gt;&amp;lt;/artifactId&amp;gt;&lt;/span&gt;
-    &lt;span 
class=&quot;nt&quot;&gt;&amp;lt;version&amp;gt;&lt;/span&gt;7.0.0-M6&lt;span 
class=&quot;nt&quot;&gt;&amp;lt;/version&amp;gt;&lt;/span&gt;
-&lt;span 
class=&quot;nt&quot;&gt;&amp;lt;/dependency&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/figure&gt;
-
-&lt;p&gt;Or download and build the distribution yourself, or use our
-convenience binary package&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;Source: &lt;a 
href=&quot;http://www.apache.org/dyn/closer.cgi/wicket/7.0.0-M6&quot;&gt;http://www.apache.org/dyn/closer.cgi/wicket/7.0.0-M6&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;Binary: &lt;a 
href=&quot;http://www.apache.org/dyn/closer.cgi/wicket/7.0.0-M6/binaries&quot;&gt;http://www.apache.org/dyn/closer.cgi/wicket/7.0.0-M6/binaries&lt;/a&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id=&quot;about-this-release&quot;&gt;About this release&lt;/h3&gt;
-
-&lt;p&gt;Below you can find the cryptographic signatures for the distributions
-and the release notes.&lt;/p&gt;
-
-&lt;h4 id=&quot;the-signatures-for-the-source-release-artefacts&quot;&gt;The 
signatures for the source release artefacts:&lt;/h4&gt;
-
-&lt;p&gt;The signatures for the source release artefacts:&lt;/p&gt;
-
-&lt;p&gt;Signature for apache-wicket-7.0.0-M6.zip:&lt;/p&gt;
-
-&lt;div class=&quot;highlight&quot;&gt;&lt;pre&gt;
------BEGIN PGP SIGNATURE-----
-Comment: GPGTools - https://gpgtools.org
-
-iEYEABECAAYFAlWANLgACgkQJBX8W/xy/UXSmQCgtAb+JrBeiq4+OdbpbN22sy+/
-F3YAn2ZeQ4byJPdmc4m4K6LLgg41AWSU
-=xN5i
------END PGP SIGNATURE-----
-&lt;/pre&gt;&lt;/div&gt;
-
-&lt;p&gt;Signature for apache-wicket-7.0.0-M6.tar.gz:&lt;/p&gt;
-
-&lt;div class=&quot;highlight&quot;&gt;&lt;pre&gt;
------BEGIN PGP SIGNATURE-----
-Comment: GPGTools - https://gpgtools.org
-
-iEYEABECAAYFAlWANLgACgkQJBX8W/xy/UUEsACgxiS2RQzuOi35Yw5C4c90KAFZ
-yPIAoMU7z9Go0pn5ZFKZwq+VDA0cvoh4
-=KW/I
------END PGP SIGNATURE-----
-&lt;/pre&gt;&lt;/div&gt;
-
-&lt;h4 id=&quot;changelog-for-700-m6&quot;&gt;CHANGELOG for 
7.0.0-M6:&lt;/h4&gt;
-
-&lt;p&gt;Release Notes - Wicket - Version 7.0.0-M6&lt;/p&gt;
-
-&lt;h4 id=&quot;bugs&quot;&gt;Bugs&lt;/h4&gt;
-
-&lt;div class=&quot;highlighter-rouge&quot;&gt;&lt;pre 
class=&quot;highlight&quot;&gt;&lt;code&gt;* [WICKET-5790] - 
VariableInterpolator &amp;amp; #getThrowExceptionOnMissingResource
-* [WICKET-5814] - CryptoMapper clears feedback messages
-* [WICKET-5816] - Apps can&#39;t use Application.setName instead of 
WicketFilter for e.g. JMX names
-* [WICKET-5822] - AjaxSelfUpdatingTimer stops working after ajax download
-* [WICKET-5825] - Deployment of wicket-examples.war fails in Tomcat
-* [WICKET-5828] - PageProvider not serializable
-* [WICKET-5834] - NPE in DefaultPropertyResolver
-* [WICKET-5835] - InlineEnclosure doesn&#39;t call child.configure() before 
updating its visilbity
-* [WICKET-5837] - JUnit tests may fail because of AbstractDefaultAjaxBehavior
-* [WICKET-5838] - Last-modified header of external markup is ignored
-* [WICKET-5841] - continueToOriginalDestination() discards new cookies
-* [WICKET-5843] - CryptoMapper doesn&#39;t work with context relative 
UrlResourceReferences
-* [WICKET-5845] - AuthenticatedWebSession.get() returns a new session with 
signedIn false
-* [WICKET-5850] - LazyInitProxyFactory causes NoClassDefFound 
org/apache/wicket/proxy/ILazyInitProxy in case of multimodule deployment
-* [WICKET-5851] - PackageResourceTest#packageResourceGuard test fails under 
Windows
-* [WICKET-5853] - LongConverter converts some values greater than 
Long.MAX_VALUE
-* [WICKET-5855] - RememberMe functionality seems to be broken after the change 
of the default crypt factory
-* [WICKET-5856] - StackOverFlowError when working with transparent containers
-* [WICKET-5857] - PagingNavigator invalid HTML (rel attribute on span tag)
-* [WICKET-5858] - AjaxRequestTarget.focusComponent does not work in modal 
window
-* [WICKET-5861] - BigDecimalConverter does not allow parsing of values great 
than Double.MAX_VALUE
-* [WICKET-5862] - Wicket Container visibility bug
-* [WICKET-5864] - Multipart Ajax form submit does not release the channel in 
case of connection failure
-* [WICKET-5869] - Kittencaptcha doesn&#39;t calculate click y-coordinate 
correctly
-* [WICKET-5870] - wicket-event-jquery.js: Wicket.Browser.isIE11() does not 
return boolean
-* [WICKET-5874] - WicketTester TagTester does not work as expected when using 
non self closing tags
-* [WICKET-5879] - Using an AjaxSubmitLink to hide its form results in an 
exception
-* [WICKET-5881] - NPE in FormComponent#updateCollectionModel in case of no 
converted input and unmodifiable collection
-* [WICKET-5883] - Feedback messages not cleared for invisible/disabled form 
components on submit.
-* [WICKET-5887] - wicket.xsd refers to non-existing xhtml.label:attlist
-* [WICKET-5891] - Parsing of ChinUnionPay credit card should use the first 6 
characters
-* [WICKET-5893] - CookieUtils should use the original response when saving a 
cookie
-* [WICKET-5895] - validateHeaders fails to detect missing head/body 
(regression)
-* [WICKET-5898] - StackOverflowError after form submit with a validation error
-* [WICKET-5900] - Add WicketTester support for IAjaxLink
-* [WICKET-5903] - Regression in mount resolution when using optional parameters
-* [WICKET-5904] - NPE after editing a markup file in debug mode
-* [WICKET-5906] - Use default on missing resource does not work
-* [WICKET-5908] - A new HtmlHeaderContainer is added each time a page instance 
is rendered
-* [WICKET-5910] - CGLib proxy should not intercept protected methods
-* [WICKET-5911] - Re-rendering page after exception in render phase does not 
call onBeforeRender()
-* [WICKET-5912] - NPE in Page#hasInvisibleTransparentChild
-* [WICKET-5915] - The application can not find /META-INF/wicket/**.properties 
on Windows systems
-* [WICKET-5916] - StackOverflowError when calling getObject() from load() in 
LDM
-* [WICKET-5917] - Do not use jQuery&#39;s $ in String snippets in Java code
-&lt;/code&gt;&lt;/pre&gt;
-&lt;/div&gt;
-
-&lt;h4 id=&quot;improvement&quot;&gt;Improvement&lt;/h4&gt;
-
-&lt;div class=&quot;highlighter-rouge&quot;&gt;&lt;pre 
class=&quot;highlight&quot;&gt;&lt;code&gt;* [WICKET-5314] - 
AbstractAutoCompleteBehavior does not support AjaxChannels
-* [WICKET-5749] - Wicket-auth-roles should deal with resource authorization
-* [WICKET-5789] - Make 
org.apache.wicket.protocol.ws.javax.WicketServerEndpointConfig publicly visible
-* [WICKET-5801] - Responsive Images
-* [WICKET-5823] - DefaultAuthenticationStrategy should be modified to reduce 
copy/paste while extending it&#39;s functionality
-* [WICKET-5829] - rename PageSettings#recreateMountedPagesAfterExpiry
-* [WICKET-5831] - Improve unsafe Id reporting in the AbstractRepeater
-* [WICKET-5832] - Do not fail at CDI&#39;s ConversationPropagator when running 
in non-http thread
-* [WICKET-5833] - Add a way to get all opened web socket connections per user 
session
-* [WICKET-5840] - WicketTester doesn&#39;t support #clickLink() for 
ExternalLink component
-* [WICKET-5859] - Add Hebrew and Arabic translations
-* [WICKET-5860] - Cross-Site Websocket Hijacking protection
-* [WICKET-5863] - Overiding disableCaching in ServletWebResponse is ignored 
when responce is buffered
-* [WICKET-5865] - AjaxEditableLabel should implement IGenericComponent
-* [WICKET-5872] - wicket extensions initializer.properties for greek language
-* [WICKET-5875] - ComponentRenderer.renderComponent() unexpectedly produces a 
WicketRuntimeException when called with a nested Component which contains a 
nested wicket:message
-* [WICKET-5889] - Ability to not submit a nested form
-* [WICKET-5892] - add ClientProperties#isJavaScriptEnabled()
-* [WICKET-5894] - Support *.woff2 webfonts in SecurePackageResourceGuard as 
well
-* [WICKET-5901] - Leaving veil when ajax processing ends with redirect
-* [WICKET-5905] - allow listening to Ajax calls before scheduling
-* [WICKET-5921] - Provide a default implementation of IModelComparator that 
always returns false
-&lt;/code&gt;&lt;/pre&gt;
-&lt;/div&gt;
-
-&lt;h4 id=&quot;new-feature&quot;&gt;New Feature&lt;/h4&gt;
-
-&lt;div class=&quot;highlighter-rouge&quot;&gt;&lt;pre 
class=&quot;highlight&quot;&gt;&lt;code&gt;* [WICKET-5819] - Support for HTML 5 
media tags (audio / video)
-* [WICKET-5827] - Allow to apply multiple Javascript / CSS compressors
-* [WICKET-5897] - Use the #isEnabled() method with validators
-* [WICKET-5918] - Create an Image component that uses the new data: protocol 
(an InlineImage)
-* [WICKET-5919] - Add support for CSRF prevention
-&lt;/code&gt;&lt;/pre&gt;
-&lt;/div&gt;
-
-&lt;h4 id=&quot;task&quot;&gt;Task&lt;/h4&gt;
-
-&lt;div class=&quot;highlighter-rouge&quot;&gt;&lt;pre 
class=&quot;highlight&quot;&gt;&lt;code&gt;* [WICKET-5896] - Upgrade jQuery to 
latest stable versions (1.11.4 &amp;amp; 2.1.3)
-&lt;/code&gt;&lt;/pre&gt;
-&lt;/div&gt;
-
-&lt;h4 id=&quot;wish&quot;&gt;Wish&lt;/h4&gt;
-
-&lt;div class=&quot;highlighter-rouge&quot;&gt;&lt;pre 
class=&quot;highlight&quot;&gt;&lt;code&gt;* [WICKET-5848] - Remove .settings 
folders of projects
-&lt;/code&gt;&lt;/pre&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Have fun!&lt;/p&gt;
-
-&lt;p&gt;— The Wicket team&lt;/p&gt;
-</content>
-    </entry>
-
 </feed>

http://git-wip-us.apache.org/repos/asf/wicket-site/blob/1f9ec1bf/content/index.html
----------------------------------------------------------------------
diff --git a/content/index.html b/content/index.html
index 4746ca3..96bd38f 100644
--- a/content/index.html
+++ b/content/index.html
@@ -244,20 +244,17 @@ The release consist of almost 300 features, improvements 
and fixes. In accordanc
 </div>
 <div class="l-two-third">
     <article>
-        <h2>CVE-2015-5347 Apache Wicket XSS vulnerability</h2>
-        <small>01 Mar 2016</small>
+        <h2>CVE-2015-7520 Apache Wicket XSS vulnerability</h2>
+        <small>02 Mar 2016</small>
         <p>Severity: Important</p>
 <p>Vendor:
 The Apache Software Foundation</p>
 <p>Versions Affected:
 Apache Wicket 1.5.x, 6.x and 7.x</p>
 <p>Description:</p>
-<p>It is possible for JavaScript statements to break out of a ModalWindow’s 
-title - only quotes are escaped in the JavaScript settings object, allowing 
JavaScript
-to be injected into the markup.</p>
+<p>It is possible for JavaScript statements to break out of a RadioGroup’s 
+and CheckBoxMultipleChoice’s “value” attribute of &lt;input&gt; 
elements</p>
 <p>This might pose a security threat if the written JavaScript contains user 
provided data.</p>
-<p>The title is now escaped by default, this can be disabled explicitly via
-  modalWindow.setEscapeModelStrings(false).</p>
 <h2 id="the-application-developers-are-recommended-to-upgrade-to">The 
application developers are recommended to upgrade to:</h2>
 <ul>
   <li><a href="/news/2016/02/19/wicket-1.5.15-released.html">Apache Wicket 
1.5.15</a></li>
@@ -265,9 +262,9 @@ to be injected into the markup.</p>
   <li><a href="/news/2016/01/20/wicket-7.2.0-released.html">Apache Wicket 
7.2.0</a></li>
 </ul>
 <p>Credit:
-This issue was reported by Tobias Gierke!</p>
+This issue was reported by Canh Ngo!</p>
 <p>Apache Wicket Team</p>
-        <a href="/news/2016/03/01/cve-2015-5347.html">Read more...</a> 
+        <a href="/news/2016/03/02/cve-2015-7520.html">Read more...</a> 
     </article>
 </div>
 <div class="l-one-third news">
@@ -279,6 +276,12 @@ title="Atom 1.0 feed" href="/atom.xml">RSS feed</a> to
 get updates in your favorite RSS reader the moment they happen.</p>
 <ul>
 <li>
+    <h3>CVE-2015-5347 Apache Wicket XSS vulnerability</h3>
+    <small>01 Mar 2016</small>
+    Severity: Important Vendor: The Apache Software Foundation Versions 
Affected: Apache Wicket 1.5.x, 6.x and 7.x Description: It is possible for 
JavaScript statements to break out...
+    <a href="/news/2016/03/01/cve-2015-5347.html">more</a>
+</li>
+<li>
     <h3>Apache Wicket 6.22.0 released</h3>
     <small>19 Feb 2016</small>
     The Apache Wicket PMC is proud to announce Apache Wicket 6.22.0! This 
release marks another minor release of Wicket 6. We use semantic versioning 
for...
@@ -302,12 +305,6 @@ get updates in your favorite RSS reader the moment they 
happen.</p>
     The Apache Wicket PMC is proud to announce Apache Wicket 6.21.0! This 
release marks another minor release of Wicket 6. We use semantic versioning 
for...
     <a href="/news/2015/11/16/wicket-6.21.0-released.html">more</a>
 </li>
-<li>
-    <h3>Apache Wicket 1.4.x end of life</h3>
-    <small>15 Nov 2015</small>
-    The Apache Wicket team announces that support for Apache Wicket 1.4.x ends 
on 16 November 2015. On the same day Wicket 1.5.x enters “security fixes”...
-    <a href="/news/2015/11/15/wicket-1.4.x-eol.html">more</a>
-</li>
 </ul>
 </div>
 <div class="l-first"></div>

http://git-wip-us.apache.org/repos/asf/wicket-site/blob/1f9ec1bf/content/learn/index.html
----------------------------------------------------------------------
diff --git a/content/learn/index.html b/content/learn/index.html
index 87dbd83..49fb172 100644
--- a/content/learn/index.html
+++ b/content/learn/index.html
@@ -72,13 +72,13 @@ We also publish a news item on our website with the 
announcement, and it is also
 <p>Here are the most recent headlines:</p>
 <ul>
   <li>
-    <p><a href="/news/2016/03/01/cve-2015-5347.html">CVE-2015-5347 Apache 
Wicket XSS vulnerability</a> <small>01 Mar 2016</small></p>
+    <p><a href="/news/2016/03/02/cve-2015-7520.html">CVE-2015-7520 Apache 
Wicket XSS vulnerability</a> <small>02 Mar 2016</small></p>
   </li>
   <li>
-    <p><a href="/news/2016/02/19/wicket-6.22.0-released.html">Apache Wicket 
6.22.0 released</a> <small>19 Feb 2016</small></p>
+    <p><a href="/news/2016/03/01/cve-2015-5347.html">CVE-2015-5347 Apache 
Wicket XSS vulnerability</a> <small>01 Mar 2016</small></p>
   </li>
   <li>
-    <p><a href="/news/2016/02/19/wicket-1.5.15-released.html">Wicket 1.5.15 
released</a> <small>19 Feb 2016</small></p>
+    <p><a href="/news/2016/02/19/wicket-6.22.0-released.html">Apache Wicket 
6.22.0 released</a> <small>19 Feb 2016</small></p>
   </li>
 </ul>
 <p>The complete articles and all other news items are available in the <a 
href="/news">archives</a>.</p>

http://git-wip-us.apache.org/repos/asf/wicket-site/blob/1f9ec1bf/content/news/2016/03/02/cve-2015-7520.html
----------------------------------------------------------------------
diff --git a/content/news/2016/03/02/cve-2015-7520.html 
b/content/news/2016/03/02/cve-2015-7520.html
new file mode 100644
index 0000000..5dfb908
--- /dev/null
+++ b/content/news/2016/03/02/cve-2015-7520.html
@@ -0,0 +1,84 @@
+<!DOCTYPE html>
+<html>
+    <head>
+        <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
+        <meta charset="utf-8">
+        <title>CVE-2015-7520 Apache Wicket XSS vulnerability | Apache 
Wicket</title>
+        <meta name="viewport" content="width=device-width, initial-scale=1" />
+
+        <link rel="shortcut icon" href="/favicon.ico" 
type="image/vnd.microsoft.icon" />
+        <link rel="stylesheet" href="/css/style.css" type="text/css" 
media="screen" />
+        <link 
href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" 
rel="stylesheet" />
+
+               <script src="//code.jquery.com/jquery-1.11.3.min.js"></script>
+
+    </head>
+
+    <body class="">
+        <div class="header default">
+    <div class="l-container">
+<nav class="mainmenu">
+    <ul>
+               <!-- /start/quickstart.html || 
/news/2016/03/02/cve-2015-7520.html -->
+       <li class=""><a href="/start/quickstart.html">Quick Start</a></li>
+               <!-- /start/download.html || 
/news/2016/03/02/cve-2015-7520.html -->
+       <li class=""><a href="/start/download.html">Download</a></li>
+               <!-- /learn || /news/2016/03/02/cve-2015-7520.html -->
+       <li class=""><a href="/learn">Documentation</a></li>
+               <!-- /help || /news/2016/03/02/cve-2015-7520.html -->
+       <li class=""><a href="/help">Support</a></li>
+               <!-- /contribute || /news/2016/03/02/cve-2015-7520.html -->
+       <li class=""><a href="/contribute">Contribute</a></li>
+               <!-- /community || /news/2016/03/02/cve-2015-7520.html -->
+       <li class=""><a href="/community">Community</a></li>
+               <!-- /apache || /news/2016/03/02/cve-2015-7520.html -->
+       <li class=""><a href="/apache">Apache</a></li>
+    </ul>
+</nav>
+        <div class="logo">
+    <a href="/"><img src="/img/logo-apachewicket-white.svg" alt="Apache 
Wicket"></a>
+</div>
+    </div>
+</div>
+<main>
+    <div class="l-container">
+        <header class="l-full preamble">
+            <h1>CVE-2015-7520 Apache Wicket XSS vulnerability</h1>
+        </header>
+        <section class="l-one-third right">
+            <div id="toc" class="toc"><div id="toc-title"><h2>Table of 
Contents</h2></div><ul><li class="toc--level-1 toc--section-1"><a 
href="#the-application-developers-are-recommended-to-upgrade-to"><span 
class="toc-number">1</span> <span class="toc-text">The application developers 
are recommended to upgrade to:</span></a></li></ul></div>
+        </section>
+        <section class="l-two-third left">
+            <div class="l-full">
+    <p class="meta">02 Mar 2016</p>
+    <p>Severity: Important</p>
+<p>Vendor:
+The Apache Software Foundation</p>
+<p>Versions Affected:
+Apache Wicket 1.5.x, 6.x and 7.x</p>
+<p>Description:</p>
+<p>It is possible for JavaScript statements to break out of a RadioGroup’s 
+and CheckBoxMultipleChoice’s “value” attribute of &lt;input&gt; 
elements</p>
+<p>This might pose a security threat if the written JavaScript contains user 
provided data.</p>
+<h2 id="the-application-developers-are-recommended-to-upgrade-to">The 
application developers are recommended to upgrade to:</h2>
+<ul>
+  <li><a href="/news/2016/02/19/wicket-1.5.15-released.html">Apache Wicket 
1.5.15</a></li>
+  <li><a href="/news/2016/02/19/wicket-6.22.0-released.html">Apache Wicket 
6.22.0</a></li>
+  <li><a href="/news/2016/01/20/wicket-7.2.0-released.html">Apache Wicket 
7.2.0</a></li>
+</ul>
+<p>Credit:
+This issue was reported by Canh Ngo!</p>
+<p>Apache Wicket Team</p>
+</div>
+        </section>
+    </div>
+</main>
+        <footer class="l-container">
+            <div class="l-full">
+       <img src="/img/asf_logo_url.svg" style="height:90px; float:left; 
margin-right:10px;">
+    <div style="margin-top:12px;">Copyright © 2016 — The Apache Software 
Foundation. Apache Wicket, Wicket, Apache, the Apache feather logo, and the 
Apache Wicket project logo are trademarks of The Apache Software Foundation. 
All other marks mentioned may be trademarks or registered trademarks of their 
respective owners.</div>
+</div>
+        </footer>
+    </body>
+
+</html>

http://git-wip-us.apache.org/repos/asf/wicket-site/blob/1f9ec1bf/content/news/2016/03/index.html
----------------------------------------------------------------------
diff --git a/content/news/2016/03/index.html b/content/news/2016/03/index.html
index 01d0a1b..738f05d 100644
--- a/content/news/2016/03/index.html
+++ b/content/news/2016/03/index.html
@@ -59,6 +59,18 @@ Apache Wicket 1.5.x, 6.x and 7.x</p>
 title - only quotes are escaped in the JavaScrip...</p>
        <a href="/news/2016/03/01/cve-2015-5347.html">more</a></li>
 </div>
+<div class="news">
+       <h3>CVE-2015-7520 Apache Wicket XSS vulnerability</h3>
+  <p><small>02 Mar 2016</small></p>
+       <p>Severity: Important</p>
+<p>Vendor:
+The Apache Software Foundation</p>
+<p>Versions Affected:
+Apache Wicket 1.5.x, 6.x and 7.x</p>
+<p>Description:</p>
+<p>It is possible for JavaScript statements to break out of a RadioGroup...</p>
+       <a href="/news/2016/03/02/cve-2015-7520.html">more</a></li>
+</div>
         </div>
         <div class="l-one-third">
             <h2>2016</h2>

http://git-wip-us.apache.org/repos/asf/wicket-site/blob/1f9ec1bf/content/news/2016/index.html
----------------------------------------------------------------------
diff --git a/content/news/2016/index.html b/content/news/2016/index.html
index a99133b..2123e65 100644
--- a/content/news/2016/index.html
+++ b/content/news/2016/index.html
@@ -52,6 +52,12 @@
                   <p>This section contains all news items published in <a 
href="/news/2016/03">March 2016</a>.</p>
               </div>
                   <div class="l-full">
+                       <h3 
id="/news/2016/03/02/cve-2015-7520.html">CVE-2015-7520 Apache Wicket XSS 
vulnerability</h3>
+                      <small>02 Mar 2016</small>
+                       <p>Severity: Important Vendor: The Apache Software 
Foundation Versions Affected: Apache Wicket 1.5.x, 6.x and 7.x Description: It 
is possible for JavaScript statements to break out...
+                       <a 
href="/news/2016/03/02/cve-2015-7520.html">more</a></li></p>
+                  </div>
+                  <div class="l-full">
                        <h3 
id="/news/2016/03/01/cve-2015-5347.html">CVE-2015-5347 Apache Wicket XSS 
vulnerability</h3>
                       <small>01 Mar 2016</small>
                        <p>Severity: Important Vendor: The Apache Software 
Foundation Versions Affected: Apache Wicket 1.5.x, 6.x and 7.x Description: It 
is possible for JavaScript statements to break out...

http://git-wip-us.apache.org/repos/asf/wicket-site/blob/1f9ec1bf/content/news/index.html
----------------------------------------------------------------------
diff --git a/content/news/index.html b/content/news/index.html
index f8a6f5e..e659b14 100644
--- a/content/news/index.html
+++ b/content/news/index.html
@@ -52,6 +52,12 @@
   <h1 id="all-news-for-2016">All News for 2016</h1>
   <p>This section contains all news items published in <a 
href="/news/2016">2016</a>.</p>
   <article>
+       <h3 id="/news/2016/03/02/cve-2015-7520.html">CVE-2015-7520 Apache 
Wicket XSS vulnerability</h3>
+    <small>02 Mar 2016</small>
+       <p>Severity: Important Vendor: The Apache Software Foundation Versions 
Affected: Apache Wicket 1.5.x, 6.x and 7.x Description: It is possible for 
JavaScript statements to break out of a RadioGroup’s and 
CheckBoxMultipleChoice’s “value” attribute of &lt;input&gt; elements This 
might pose a security threat if the written JavaScript contains user provided 
data. The...
+       <a href="/news/2016/03/02/cve-2015-7520.html">more</a></p>
+</article>
+  <article>
        <h3 id="/news/2016/03/01/cve-2015-5347.html">CVE-2015-5347 Apache 
Wicket XSS vulnerability</h3>
     <small>01 Mar 2016</small>
        <p>Severity: Important Vendor: The Apache Software Foundation Versions 
Affected: Apache Wicket 1.5.x, 6.x and 7.x Description: It is possible for 
JavaScript statements to break out of a ModalWindow’s title - only quotes are 
escaped in the JavaScript settings object, allowing JavaScript to be injected 
into the markup. This might pose...

Reply via email to