Security Advisory WSO2-2016-0135¶
Published: November 08, 2016
- WSO2 API Manager 2.0.0
- WSO2 App Manager 1.2.0
- WSO2 Application Server 5.3.0
- WSO2 Business Rules Server 2.1.0
- WSO2 Dashboard Server 2.0.0
- WSO2 Message Broker 3.1.0
An Open Redirect vulnerability is discovered in the Carbon Management Console.
The following pages in the management console were found to be vulnerable to open redirect attacks, in the products mentioned here.
- XACML Policy Administration
- Identity Provider Management
- Workflow Management
- User Management
An attacker can attack the above UI components, by modifying some query parameters that contain a URL value in the management console context. They can modify the respective query parameter value such that the management console will redirect the request to the specified URL.
An attacker aware of the management console origin, can modify the query parameter values to a URL value of a malicious site, and trick a user to invoke the modified URL via email or a neutral website. This redirects the user to the malicious site and the attacker may successfully launch a phishing scam and steal user credentials or other sensitive information, or harm in any other way.
For WSO2 Update Manager (WUM) Supported Products¶
Use WUM to update the following products.
|WSO2 API Manager
For Other Products¶
Apply the following patches based on your products by following the instructions in the README file. Patches can also be downloaded from Security Patch Releases. If you have any questions, post them to firstname.lastname@example.org.
|WSO2 App Manager
|WSO2 Application Server
|WSO2 Dashboard Server
|WSO2 Enterprise Store
|WSO2 Message Broker
If you are using newer versions of the products than the ones mentioned in the "SOLUTION" section, this vulnerability is fixed.