On Wed, May 26, 2021, 18:37 Mihir Chhaya <mihir.chh...@gmail.com> wrote:

> Thank you for the reply.
>
> We have something like below in our code. Will this be enough or still we
> need to replace the jar file?
>

The CVE is about usage of Wicket APIs.

Anything you do in your app code is your responsibility to make sure is
secure.


> public static String getRemoteAddr(HttpServletRequest request) {
>
>
>  //If routed behind the Load Balancer, network guys put the original IP in
> the header as XForwarded-For
>
>  String remoteAddr = request.getHeader("X-Forwarded-For");
>
>  if (StrUtils.isBlank(remoteAddr)) {
>
> remoteAddr= request.getHeader("x-forwarded-for");
>
>  }
>
>  if (StrUtils.isBlank(remoteAddr)) {
>
> remoteAddr=request.getRemoteAddr();
>
>  }
>
>  return remoteAddr;
>
> }
>
>
> On Wed, May 26, 2021 at 11:05 AM Matt Pavlovich <mattr...@gmail.com>
> wrote:
>
> > Thank you for the notice, and the already fixed releases =)
> >
> > Is there a JIRA or associated PR with the fix? I’m not seeing a specific
> > fix in the changelogs for 9.3.0 and 8.12.0.
> >
> > Thanks,
> > Matt Pavlovich
> >
> > > On May 25, 2021, at 2:51 AM, Emond Papegaaij <
> emond.papega...@gmail.com>
> > wrote:
> > >
> > > Description:
> > >
> > > A DNS proxy and possible amplification attack vulnerability in
> > > WebClientInfo of Apache Wicket allows an attacker to trigger arbitrary
> > > DNS lookups from the server when the X-Forwarded-For header is not
> > > properly sanitized. This DNS lookup can be engineered to overload an
> > > internal DNS server or to slow down request processing of the Apache
> > > Wicket application causing a possible denial of service on either the
> > > internal infrastructure or the web application itself.
> > >
> > > This issue affects Apache Wicket Apache Wicket 9.x version 9.2.0 and
> > > prior versions; Apache Wicket 8.x version 8.11.0 and prior versions;
> > > Apache Wicket 7.x version 7.17.0 and prior versions and Apache Wicket
> > > 6.x version 6.2.0 and later versions.
> > >
> > > Mitigation:
> > >
> > > Sanitize the X-Forwarded-For header by running an Apache Wicket
> > > application behind a reverse HTTP proxy. This proxy should put the
> > > client IP address in the X-Forwarded-For header and not pass through
> > > the contents of the header as received by the client.
> > >
> > > The application developers are recommended to upgrade to:
> > > - Apache Wicket 7.18.0
> > > <https://wicket.apache.org/news/2021/04/06/wicket-7.18.0-released.html
> >
> > > - Apache Wicket 8.12.0
> > > <https://wicket.apache.org/news/2021/03/31/wicket-8.12.0-released.html
> >
> > > - Apache Wicket 9.0.0
> > > <https://wicket.apache.org/news/2021/03/30/wicket-9.3.0-released.html>
> > >
> > > Credit:
> > >
> > > Apache Wicket would like to thank Jonathan Juursema from
> > > Topicus.Healthcare for reporting this issue.
> > >
> > > Apache Wicket Team
> > >
> > > ---------------------------------------------------------------------
> > > To unsubscribe, e-mail: users-unsubscr...@wicket.apache.org
> > > For additional commands, e-mail: users-h...@wicket.apache.org
> > >
> >
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: users-unsubscr...@wicket.apache.org
> > For additional commands, e-mail: users-h...@wicket.apache.org
> >
> >
>

Reply via email to