On Tue, Apr 5, 2022, 13:18 kyrindorx <kyrind...@gmail.com> wrote:

> Hi,
>
> Thank you for the first answer of this issue. I have also a question
> about https://github.com/MarcGiffing/wicket-spring-boot and a upgrade of
> spring-beans or spring in general. Do you have good idea upgrade spring
> to version 5.2.20, 5.3.18 without an impact with wicket-spring-boot?
> I'll thankful for any hints :)
>

Just update/overwrite the Spring version in your pom.xml and all should be
fine!


> Background:
>
> https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751
>
>
> Greets
> Daniel
>
>
> Am 01.04.2022 um 20:17 schrieb Martin Grigorov:
> > Hi,
> >
> > I don't think a normal Wicket application is vulnerable to this attack.
> > But I recommend you to update Spring in your applications anyway.
> >
> > On Fri, Apr 1, 2022, 10:21 kyrindorx<kyrind...@gmail.com>  wrote:
> >
> >> Hello everyone,
> >>
> >> The internet developer community found a bug in
> >> spring-beans/spring-webmvc on 03/30/2022. I would like to know to what
> >> extent Wicket could be affected for this exploit? I think it should be a
> >> specific behavior with Spring and the servlet engine (Tomcat was used in
> >> the exploit), but Wicket is also a servlet-driven web framework.
> >>
> >> The exploit used a code injection block with "<% bad java code/cmds %>"
> >> and a beanintrospeaction via a rest service call. What is the opinion of
> >> the Wicket core team on this issue?
> >>
> >> Thanks in advance
> >> Daniel
> >>
> >>
> >> Sources:
> >> https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751
> >> (informed by github)
> >> https://tanzu.vmware.com/security/cve-2022-22965
> >> https://github.com/tweedge/springcore-0day-en

Reply via email to