Vulnerability Details : CVE-2012-3373
Cross-site scripting (XSS) vulnerability in Apache Wicket 1.4.x before 1.4.21 and 1.5.x before 1.5.8 allows remote attackers to inject arbitrary web script or HTML via vectors involving a %00 sequence in an Ajax link URL associated with a Wicket app.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2012-3373
Probability of exploitation activity in the next 30 days: 0.41%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 71 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-3373
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2012-3373
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-3373
-
http://www.securityfocus.com/bid/55445
Apache Wicket CVE-2012-3373 Cross Site Scripting Vulnerability
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/78321
Apache Wicket unspecified cross-site scripting CVE-2012-3373 Vulnerability Report
-
http://wicket.apache.org/2012/09/06/cve-2012-3373.html
404 Not FoundVendor Advisory
-
http://www.securitytracker.com/id?1027508
Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks - SecurityTracker
Products affected by CVE-2012-3373
- cpe:2.3:a:apache:wicket:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.14:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.15:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.16:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.17:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.18:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.19:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.4.20:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:wicket:1.5.6:*:*:*:*:*:*:*