Security Advisory WSO2-2016-0158

Published: October 31, 2016


AFFECTED PRODUCTS

  • WSO2 API Manager 2.0.0
  • WSO2 App Manager 1.2.0
  • WSO2 Application Server 5.3.0
  • WSO2 Business Process Server 3.6.0
  • WSO2 Business Rules Server 2.2.0
  • WSO2 Dashboard Server 2.0.0
  • WSO2 Enterprise Service Bus 5.0.0
  • WSO2 Enterprise Mobility Manager 2.0.1
  • WSO2 Enterprise Store 2.1.0
  • WSO2 Governance Registry 5.3.0
  • WSO2 Message Broker 3.1.0

OVERVIEW

The secondary JDBC user store connection test option in the management console of the above-mentioned WSO2 Servers exposes sensitive data in URL query parameters.

DESCRIPTION

Testing the connection from the WSO2 server's management console while adding a secondary JDBC user store initiates an HTTP GET request, including the connection credentials in URL query parameters. Thus, database connection credentials get exposed and also get logged in HTTP access logs.

IMPACT

An attacker can steal database credentials and abuse the system if access is obtained to view access logs or browser history as all sensitive information to the respective connection including the credentials are exposed in HTTP access logs and URL query parameters.

SOLUTION

For WSO2 Update Manager (WUM) Supported Products

Use WUM to update the following products.

Code Product Version
AM WSO2 API Manager 2.0.0
ESB WSO2 Enterprise Service Bus 5.0.0

For Other Products

Apply the following patches based on your products by following the instructions in the README file. Patches can also be downloaded from Security Patch Releases. If you have any questions, post them to security@wso2.com.

Code Product Version Patch
APPM WSO2 App Manager 1.2.0 WSO2-CARBON-PATCH-4.4.0-0429
AS WSO2 Application Server 5.3.0 WSO2-CARBON-PATCH-4.4.0-0432
BPS WSO2 Business Process Server 3.6.0 WSO2-CARBON-PATCH-4.4.0-0429
BRS WSO2 Business Rules Server 2.2.0 WSO2-CARBON-PATCH-4.4.0-0427
DS WSO2 Dashboard Server 2.0.0 WSO2-CARBON-PATCH-4.4.0-0427
EMM WSO2 Enterprise Mobility Manager 2.0.1 WSO2-CARBON-PATCH-4.4.0-0427
ES WSO2 Enterprise Store 2.1.0 WSO2-CARBON-PATCH-4.4.0-0429
GREG WSO2 Governance Registry 5.3.0 WSO2-CARBON-PATCH-4.4.0-0429
MB WSO2 Message Broker 3.1.0 WSO2-CARBON-PATCH-4.4.0-0431

Info

If you are using newer versions of the products than the ones mentioned in the "SOLUTION" section, this vulnerability is fixed.