Vulnerabilites related to WSO2 - WSO2 API Manager
cve-2024-2321
Vulnerability from cvelistv5
Published
2025-02-27 04:08
Modified
2025-02-27 14:43
Severity ?
EPSS score ?
Summary
An incorrect authorization vulnerability exists in multiple WSO2 products, allowing protected APIs to be accessed directly using a refresh token instead of the expected access token. Due to improper authorization checks and token mapping, session cookies are not required for API access, potentially enabling unauthorized operations.
Exploitation requires an attacker to obtain a valid refresh token of an admin user. Since refresh tokens generally have a longer expiration time, this could lead to prolonged unauthorized access to API resources, impacting data confidentiality and integrity.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 4.0.0 < 4.0.0.275 Version: 4.1.0 < 4.1.0.153 Version: 4.2.0 < 4.2.0.83 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-2321", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-27T14:43:03.702935Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T14:43:16.368Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "4.0.0.275", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.153", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.83", "status": "affected", "version": "4.2.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "5.9.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.11.0.326", "status": "affected", "version": "5.11.0", "versionType": "custom" }, { "lessThan": "6.0.0.172", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.130", "status": "affected", "version": "6.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eAn incorrect authorization vulnerability exists in multiple WSO2 products, allowing protected APIs to be accessed directly using a refresh token instead of the expected access token. Due to improper authorization checks and token mapping, session cookies are not required for API access, potentially enabling unauthorized operations.\u003c/p\u003e\u003cp\u003eExploitation requires an attacker to obtain a valid refresh token of an admin user. Since refresh tokens generally have a longer expiration time, this could lead to prolonged unauthorized access to API resources, impacting data confidentiality and integrity.\u003c/p\u003e" } ], "value": "An incorrect authorization vulnerability exists in multiple WSO2 products, allowing protected APIs to be accessed directly using a refresh token instead of the expected access token. Due to improper authorization checks and token mapping, session cookies are not required for API access, potentially enabling unauthorized operations.\n\nExploitation requires an attacker to obtain a valid refresh token of an admin user. Since refresh tokens generally have a longer expiration time, this could lead to prolonged unauthorized access to API resources, impacting data confidentiality and integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-27T04:08:33.552Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3213/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3213/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3213/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3213/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3213/#solution" } ], "source": { "advisory": "WSO2-2024-3213", "discovery": "INTERNAL" }, "title": "Incorrect Authorization in Multiple WSO2 Products Allows API Access via Refresh Token", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-2321", "datePublished": "2025-02-27T04:08:33.552Z", "dateReserved": "2024-03-08T10:50:05.874Z", "dateUpdated": "2025-02-27T14:43:16.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5848
Vulnerability from cvelistv5
Published
2025-02-27 07:08
Modified
2025-02-27 14:40
Severity ?
EPSS score ?
Summary
A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper input validation. User-supplied data is directly included in server responses from vulnerable service endpoints without proper sanitization or encoding, allowing an attacker to inject malicious JavaScript.
Successful exploitation could lead to UI manipulation, redirection to malicious websites, or data exfiltration from the browser. While session-related sensitive cookies are protected with the httpOnly flag, mitigating session hijacking risks, the impact may vary depending on gateway-level service restrictions.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 3.1.0 < 3.1.0.285 Version: 3.2.0 < 3.2.0.375 Version: 3.2.1 < 3.2.1.10 Version: 4.0.0 < 4.0.0.300 Version: 4.1.0 < 4.1.0.160 Version: 4.2.0 < 4.2.0.92 Version: 4.3.0 < 4.3.0.10 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5848", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-27T14:40:09.476157Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T14:40:20.053Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.1.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.1.0.285", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.375", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.10", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.300", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.160", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.92", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.10", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.349", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper input validation. User-supplied data is directly included in server responses from vulnerable service endpoints without proper sanitization or encoding, allowing an attacker to inject malicious JavaScript.\u003cbr\u003e\u003cbr\u003eSuccessful exploitation could lead to UI manipulation, redirection to malicious websites, or data exfiltration from the browser. While session-related sensitive cookies are protected with the httpOnly flag, mitigating session hijacking risks, the impact may vary depending on gateway-level service restrictions.\u003cbr\u003e\u003cbr\u003e" } ], "value": "A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to improper input validation. User-supplied data is directly included in server responses from vulnerable service endpoints without proper sanitization or encoding, allowing an attacker to inject malicious JavaScript.\n\nSuccessful exploitation could lead to UI manipulation, redirection to malicious websites, or data exfiltration from the browser. While session-related sensitive cookies are protected with the httpOnly flag, mitigating session hijacking risks, the impact may vary depending on gateway-level service restrictions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-27T07:08:07.346Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3450/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3450/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3450/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3450/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3450/#solution" } ], "source": { "advisory": "WSO2-2024-3450", "discovery": "INTERNAL" }, "title": "Reflected Cross-Site Scripting (XSS) in Multiple WSO2 Products Due to Improper Input Validation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-5848", "datePublished": "2025-02-27T07:08:07.346Z", "dateReserved": "2024-06-11T07:22:24.988Z", "dateUpdated": "2025-02-27T14:40:20.053Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6836
Vulnerability from cvelistv5
Published
2023-12-15 09:26
Modified
2024-08-02 08:42
Severity ?
EPSS score ?
Summary
Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 3.0.0.0 < 3.0.0.1 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:08.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager ", "repo": "https://github.com/wso2/product-apim", "vendor": "WSO2", "versions": [ { "lessThan": "3.0.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.0.0.1", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager Analytics", "repo": "https://github.com/wso2/analytics-apim", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.1", "status": "affected", "version": "2.2.0.0", "versionType": "custom" }, { "lessThan": "2.5.0.1", "status": "affected", "version": "2.5.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Microgateway", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.1", "status": "affected", "version": "2.2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Enterprise Integrator", "repo": "https://github.com/wso2/product-ei", "vendor": "WSO2", "versions": [ { "lessThan": "6.0.0.2", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "6.0.0.3", "status": "affected", "version": "6.0.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.5", "status": "affected", "version": "6.1.0.0", "versionType": "custom" }, { "lessThan": "6.1.1.5", "status": "affected", "version": "6.1.1.0", "versionType": "custom" }, { "lessThan": "6.6.0.1", "status": "affected", "version": "6.6.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 IS as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.5.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.5.0.1", "status": "affected", "version": "5.5.0.0", "versionType": "custom" }, { "lessThan": "5.6.0.1", "status": "affected", "version": "5.6.0.0", "versionType": "custom" }, { "lessThan": "5.7.0.1", "status": "affected", "version": "5.7.0.0", "versionType": "custom" }, { "lessThan": "5.9.0.1", "status": "affected", "version": "5.9.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "repo": "https://github.com/wso2/product-is", "vendor": "WSO2", "versions": [ { "lessThan": "5.4.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.4.0.1", "status": "affected", "version": "5.4.0.0", "versionType": "custom" }, { "lessThan": "5.4.1.1", "status": "affected", "version": "5.4.1.0", "versionType": "custom" }, { "lessThan": "5.5.0.1", "status": "affected", "version": "5.5.0.0", "versionType": "custom" }, { "lessThan": "5.6.0.1", "status": "affected", "version": "5.6.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Micro Integrator", "vendor": "WSO2", "versions": [ { "lessThan": "1.0.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "1.0.0.1", "status": "affected", "version": "1.0.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information." } ], "value": "Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information." } ], "impacts": [ { "capecId": "CAPEC-250", "descriptions": [ { "lang": "en", "value": "CAPEC-250 XML Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-09T05:03:32.570Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\u003cbr\u003e\u003cbr\u003eCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/\u003c/a\u003e\u003cbr\u003e" } ], "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/ https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/ \n" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2023-6836", "datePublished": "2023-12-15T09:26:01.323Z", "dateReserved": "2023-12-15T09:25:13.205Z", "dateUpdated": "2024-08-02T08:42:08.180Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6839
Vulnerability from cvelistv5
Published
2023-12-15 10:14
Modified
2024-10-08 14:14
Severity ?
EPSS score ?
Summary
Due to improper error handling, a REST API resource could expose a server side error containing an internal WSO2 specific package name in the HTTP response.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WSO2 | WSO2 API Manager |
Version: 3.0.0.0 < 3.0.0.15 Version: 3.2.0.0 < 3.2.0.32 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:07.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1334/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-6839", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-14T18:47:07.653315Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:14:43.216Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "repo": "https://github.com/wso2/product-apim", "vendor": "WSO2", "versions": [ { "lessThan": "3.0.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.0.0.15", "status": "affected", "version": "3.0.0.0", "versionType": "custom" }, { "lessThan": "3.2.0.32", "status": "affected", "version": "3.2.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eDue to improper error handling, a REST API resource could expose a server side error containing an internal WSO2 specific package name in the HTTP response.\u003c/p\u003e" } ], "value": "Due to improper error handling, a REST API resource could expose a server side error containing an internal WSO2 specific package name in the HTTP response.\n\n" } ], "impacts": [ { "capecId": "CAPEC-37", "descriptions": [ { "lang": "en", "value": "CAPEC-37 Retrieve Embedded Sensitive Data" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209 Generation of Error Message Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-15T10:14:14.676Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1334/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\u003cbr\u003e\u003cbr\u003eCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1334/\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1...\u003c/a\u003e\u003cbr\u003e" } ], "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1334/ \n" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2023-6839", "datePublished": "2023-12-15T10:14:14.676Z", "dateReserved": "2023-12-15T10:13:25.068Z", "dateUpdated": "2024-10-08T14:14:43.216Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6835
Vulnerability from cvelistv5
Published
2023-12-15 09:16
Modified
2024-08-02 08:42
Severity ?
EPSS score ?
Summary
Multiple WSO2 products have been identified as vulnerable due to lack of server-side input validation in the Forum feature, API rating could be manipulated.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 2.2.0.0 < 2.2.0.16 Version: 2.5.0.0 < 2.5.0.17 Version: 2.6.0.0 < 2.6.0.24 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:07.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1357/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "repo": "https://github.com/wso2/product-apim", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.16", "status": "affected", "version": "2.2.0.0", "versionType": "custom" }, { "lessThan": "2.5.0.17", "status": "affected", "version": "2.5.0.0", "versionType": "custom" }, { "lessThan": "2.6.0.24", "status": "affected", "version": "2.6.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 IoT Server", "repo": "https://github.com/wso2/product-iots", "vendor": "WSO2", "versions": [ { "lessThan": "3.3.1.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.3.1.17", "status": "affected", "version": "3.3.1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple WSO2 products have been identified as vulnerable d\u003cspan style=\"background-color: var(--wht);\"\u003eue to lack of server-side input validation in the \u003c/span\u003e\u003cstrong\u003eForum\u003c/strong\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;feature, API rating could be manipulated.\u003c/span\u003e" } ], "value": "Multiple WSO2 products have been identified as vulnerable due to lack of server-side input validation in the Forum\u00a0feature, API rating could be manipulated." } ], "impacts": [ { "capecId": "CAPEC-153", "descriptions": [ { "lang": "en", "value": "CAPEC-153 Input Data Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-15T09:16:27.473Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1357/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\u003cbr\u003e\u003cbr\u003eCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1357/\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1...\u003c/a\u003e\u003cbr\u003e" } ], "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1357/ \n" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2023-6835", "datePublished": "2023-12-15T09:16:27.473Z", "dateReserved": "2023-12-15T09:13:13.207Z", "dateUpdated": "2024-08-02T08:42:07.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6911
Vulnerability from cvelistv5
Published
2023-12-18 08:32
Modified
2024-08-02 08:42
Severity ?
EPSS score ?
Summary
Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 2.2.0.0 < 2.2.0.1 Version: 2.5.0.0 < 2.5.0.1 Version: 2.6.0.0 < 2.6.0.1 Version: 3.0.0.0 < 3.0.0.1 Version: 3.1.0.0 < 3.1.0.1 Version: 3.2.0.0 < 3.2.0.1 |
|||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:08.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "repo": "https://github.com/wso2/product-apim", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.1", "status": "affected", "version": "2.2.0.0", "versionType": "custom" }, { "lessThan": "2.5.0.1", "status": "affected", "version": "2.5.0.0", "versionType": "custom" }, { "lessThan": "2.6.0.1", "status": "affected", "version": "2.6.0.0", "versionType": "custom" }, { "lessThan": "3.0.0.1", "status": "affected", "version": "3.0.0.0", "versionType": "custom" }, { "lessThan": "3.1.0.1", "status": "affected", "version": "3.1.0.0", "versionType": "custom" }, { "lessThan": "3.2.0.1", "status": "affected", "version": "3.2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager Analytics", "repo": "https://github.com/wso2/analytics-apim", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.1", "status": "affected", "version": "2.2.0.0", "versionType": "custom" }, { "lessThan": "2.5.0.1", "status": "affected", "version": "2.5.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Microgateway", "vendor": "WSO2", "versions": [ { "lessThan": "2.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.2.0.1", "status": "affected", "version": "2.2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Data Analytics Server", "vendor": "WSO2", "versions": [ { "lessThan": "3.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.2.0.1", "status": "affected", "version": "3.2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Enterprise Integrator", "repo": "https://github.com/wso2/product-ei", "vendor": "WSO2", "versions": [ { "lessThan": "6.1.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "6.1.0.9", "status": "affected", "version": "6.1.0.0", "versionType": "custom" }, { "lessThan": "6.1.1.9", "status": "affected", "version": "6.1.1.0", "versionType": "custom" }, { "lessThan": "6.2.0.7", "status": "affected", "version": "6.2.0.0", "versionType": "custom" }, { "lessThan": "6.3.0.1", "status": "affected", "version": "6.3.0.0", "versionType": "custom" }, { "lessThan": "6.4.0.1", "status": "affected", "version": "6.4.0.0", "versionType": "custom" }, { "lessThan": "6.5.0.6", "status": "affected", "version": "6.5.0.0", "versionType": "custom" }, { "lessThan": "6.6.0.11", "status": "affected", "version": "6.6.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 IS as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.5.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.5.0.1", "status": "affected", "version": "5.5.0.0", "versionType": "custom" }, { "lessThan": "5.6.0.1", "status": "affected", "version": "5.6.0.0", "versionType": "custom" }, { "lessThan": "5.7.0.1", "status": "affected", "version": "5.7.0.0", "versionType": "custom" }, { "lessThan": "5.9.0.1", "status": "affected", "version": "5.9.0.0", "versionType": "custom" }, { "lessThan": "5.10.0.1", "status": "affected", "version": "5.10.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "repo": "https://github.com/wso2/product-is", "vendor": "WSO2", "versions": [ { "lessThan": "5.4.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.4.0.4", "status": "affected", "version": "5.4.0.0", "versionType": "custom" }, { "lessThan": "5.4.1.3", "status": "affected", "version": "5.4.1.0", "versionType": "custom" }, { "lessThan": "5.5.0.1", "status": "affected", "version": "5.5.0.0", "versionType": "custom" }, { "lessThan": "5.6.0.1", "status": "affected", "version": "5.6.0.0", "versionType": "custom" }, { "lessThan": "5.7.0.1", "status": "affected", "version": "5.7.0.0", "versionType": "custom" }, { "lessThan": "5.8.0.5", "status": "affected", "version": "5.8.0.0", "versionType": "custom" }, { "lessThan": "5.9.0.1", "status": "affected", "version": "5.9.0.0", "versionType": "custom" }, { "lessThan": "5.10.0.1", "status": "affected", "version": "5.10.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server Analytics", "repo": "https://github.com/wso2/analytics-is", "vendor": "WSO2", "versions": [ { "lessThan": "5.4.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.4.0.2", "status": "affected", "version": "5.4.0.0", "versionType": "custom" }, { "lessThan": "5.4.1.2", "status": "affected", "version": "5.4.1.0", "versionType": "custom" }, { "lessThan": "5.5.0.1", "status": "affected", "version": "5.5.0.0", "versionType": "custom" }, { "lessThan": "5.6.0.1", "status": "affected", "version": "5.6.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Message Broker", "vendor": "WSO2", "versions": [ { "lessThan": "3.2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.2.0.3", "status": "affected", "version": "3.2.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console.\u003cbr\u003e" } ], "value": "Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console.\n" } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-18T08:32:58.961Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\u003cbr\u003e\u003cbr\u003eCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1...\u003c/a\u003e\u003cbr\u003e" } ], "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/ \n" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2023-6911", "datePublished": "2023-12-18T08:32:58.961Z", "dateReserved": "2023-12-18T08:23:45.214Z", "dateUpdated": "2024-08-02T08:42:08.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6838
Vulnerability from cvelistv5
Published
2023-12-15 09:50
Modified
2024-08-02 08:42
Severity ?
EPSS score ?
Summary
Reflected XSS vulnerability can be exploited by tampering a request parameter in Authentication Endpoint. This can be performed in both authenticated and unauthenticated requests.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 3.1.0.0 < 3.1.0.14 Version: 3.2.0.0 < 3.2.0.10 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:07.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1233/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "repo": "https://github.com/wso2/product-apim", "vendor": "WSO2", "versions": [ { "lessThan": "3.1.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.1.0.14", "status": "affected", "version": "3.1.0.0", "versionType": "custom" }, { "lessThan": "3.2.0.10", "status": "affected", "version": "3.2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "repo": "https://github.com/wso2/product-is", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.5", "status": "affected", "version": "5.10.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 IS as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.5", "status": "affected", "version": "5.10.0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eReflected XSS vulnerability can be exploited by tampering a request parameter in Authentication Endpoint. This can be performed in both authenticated and unauthenticated requests.\u003c/p\u003e" } ], "value": "Reflected XSS vulnerability can be exploited by tampering a request parameter in Authentication Endpoint. This can be performed in both authenticated and unauthenticated requests.\n\n" } ], "impacts": [ { "capecId": "CAPEC-591", "descriptions": [ { "lang": "en", "value": "CAPEC-591 Reflected XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-15T09:50:52.147Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1233/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\u003cbr\u003e\u003cbr\u003eCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1233/\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1...\u003c/a\u003e\u003cbr\u003e" } ], "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1233/ \n" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2023-6838", "datePublished": "2023-12-15T09:50:52.147Z", "dateReserved": "2023-12-15T09:45:13.869Z", "dateUpdated": "2024-08-02T08:42:07.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6837
Vulnerability from cvelistv5
Published
2023-12-15 09:41
Modified
2024-08-02 08:42
Severity ?
EPSS score ?
Summary
Multiple WSO2 products have been identified as vulnerable to perform user impersonatoin using JIT provisioning. In order for this vulnerability to have any impact on your deployment, following conditions must be met:
* An IDP configured for federated authentication and JIT provisioning enabled with the "Prompt for username, password and consent" option.
* A service provider that uses the above IDP for federated authentication and has the "Assert identity using mapped local subject identifier" flag enabled.
Attacker should have:
* A fresh valid user account in the federated IDP that has not been used earlier.
* Knowledge of the username of a valid user in the local IDP.
When all preconditions are met, a malicious actor could use JIT provisioning flow to perform user impersonation.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 API Manager |
Version: 2.5.0.0 < 2.5.0.32 Version: 2.6.0.0 < 2.6.0.52 Version: 3.0.0.0 < 3.0.0.50 Version: 3.1.0.0 < 3.1.0.72 Version: 3.2.0.0 < 3.2.0.86 Version: 4.0.0.0 < 4.0.0.35 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:07.403Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1573/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "repo": "https://github.com/wso2/product-apim", "vendor": "WSO2", "versions": [ { "lessThan": "2.5.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.5.0.32", "status": "affected", "version": "2.5.0.0", "versionType": "custom" }, { "lessThan": "2.6.0.52", "status": "affected", "version": "2.6.0.0", "versionType": "custom" }, { "lessThan": "3.0.0.50", "status": "affected", "version": "3.0.0.0", "versionType": "custom" }, { "lessThan": "3.1.0.72", "status": "affected", "version": "3.1.0.0", "versionType": "custom" }, { "lessThan": "3.2.0.86", "status": "affected", "version": "3.2.0.0", "versionType": "custom" }, { "lessThan": "4.0.0.35", "status": "affected", "version": "4.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "repo": "https://github.com/wso2/product-is", "vendor": "WSO2", "versions": [ { "lessThan": "5.6.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.6.0.16", "status": "affected", "version": "5.6.0.0", "versionType": "custom" }, { "lessThan": "5.7.0.35", "status": "affected", "version": "5.7.0.0", "versionType": "custom" }, { "lessThan": "5.8.0.26", "status": "affected", "version": "5.8.0.0", "versionType": "custom" }, { "lessThan": "5.9.0.38", "status": "affected", "version": "5.9.0.0", "versionType": "custom" }, { "lessThan": "5.10.0.78", "status": "affected", "version": "5.10.0.0", "versionType": "custom" }, { "lessThan": "5.11.0.69", "status": "affected", "version": "5.11.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 IS as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.6.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.6.0.17", "status": "affected", "version": "5.6.0.0", "versionType": "custom" }, { "lessThan": "5.7.0.39", "status": "affected", "version": "5.7.0.0", "versionType": "custom" }, { "lessThan": "5.9.0.45", "status": "affected", "version": "5.9.0.0", "versionType": "custom" }, { "lessThan": "5.10.0.80", "status": "affected", "version": "5.10.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon.identity.framework:org.wso2.carbon.identity.application.authentication.endpoint.util", "product": "WSO2 Carbon Identity Application Authentication Endpoint(Utils)", "repo": "https://github.com/wso2/identity-apps", "vendor": "WSO2", "versions": [ { "lessThan": "5.11.256.*", "status": "unaffected", "version": "5.11.256.3", "versionType": "maven" }, { "lessThan": "5.12.153.*", "status": "unaffected", "version": "5.12.153.19", "versionType": "maven" }, { "lessThan": "5.12.387.*", "status": "unaffected", "version": "5.12.387.7", "versionType": "maven" }, { "lessThan": "5.12.153.*", "status": "unaffected", "version": "5.12.153.21", "versionType": "maven" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "5.20.254", "versionType": "maven" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon.identity.framework:org.wso2.carbon.identity.application.authentication.framework", "product": "WSO2 Carbon Identity Application Authentication Framework", "repo": "https://github.com/wso2/carbon-identity-framework", "vendor": "WSO2", "versions": [ { "lessThan": "5.11.256.*", "status": "unaffected", "version": "5.11.256.3", "versionType": "maven" }, { "lessThan": "5.12.153.*", "status": "unaffected", "version": "5.12.153.21", "versionType": "maven" }, { "lessThan": "5.12.387.*", "status": "unaffected", "version": "5.12.387.7", "versionType": "maven" }, { "lessThan": "5.14.97.*", "status": "unaffected", "version": "5.14.97.22", "versionType": "maven" }, { "lessThan": "5.17.5.*", "status": "unaffected", "version": "5.17.5.106", "versionType": "maven" }, { "lessThan": "5.18.187.*", "status": "unaffected", "version": "5.18.187.76", "versionType": "maven" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "5.20.254", "versionType": "maven" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple WSO2 products have been identified as vulnerable to perform user impersonatoin using JIT provisioning.\u0026nbsp;\u003cp\u003eIn order for this vulnerability to have any impact on your deployment, following conditions must be met:\u003c/p\u003e\u003cul\u003e\u003cli\u003eAn IDP configured for federated authentication and JIT provisioning enabled with the \"Prompt for username, password and consent\" option.\u003c/li\u003e\u003cli\u003eA service provider that uses the above IDP for federated authentication and has the \"Assert identity using mapped local subject identifier\" flag enabled.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eAttacker should have:\u003c/p\u003e\u003cul\u003e\u003cli\u003eA fresh valid user account in the federated IDP that has not been used earlier.\u003c/li\u003e\u003cli\u003eKnowledge of the username of a valid user in the local IDP.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eWhen all preconditions are met, a malicious actor could use JIT provisioning flow to perform user impersonation.\u003c/p\u003e" } ], "value": "Multiple WSO2 products have been identified as vulnerable to perform user impersonatoin using JIT provisioning.\u00a0In order for this vulnerability to have any impact on your deployment, following conditions must be met:\n\n * An IDP configured for federated authentication and JIT provisioning enabled with the \"Prompt for username, password and consent\" option.\n * A service provider that uses the above IDP for federated authentication and has the \"Assert identity using mapped local subject identifier\" flag enabled.\n\n\nAttacker should have:\n\n * A fresh valid user account in the federated IDP that has not been used earlier.\n * Knowledge of the username of a valid user in the local IDP.\n\n\nWhen all preconditions are met, a malicious actor could use JIT provisioning flow to perform user impersonation.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-07T05:36:55.643Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1573/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\u003cbr\u003e\u003cbr\u003eCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1573/\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1...\u003c/a\u003e\u003cbr\u003e" } ], "value": "For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly.\n\nCommunity users may apply the relevant fixes to the product based on the public fix(s) advertised in\u00a0 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1573/ \n" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2023-6837", "datePublished": "2023-12-15T09:41:22.719Z", "dateReserved": "2023-12-15T09:40:50.666Z", "dateUpdated": "2024-08-02T08:42:07.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }