Security Advisory WSO2-2016-0158¶
Published: October 31, 2016
- WSO2 API Manager 2.0.0
- WSO2 App Manager 1.2.0
- WSO2 Application Server 5.3.0
- WSO2 Business Process Server 3.6.0
- WSO2 Business Rules Server 2.2.0
- WSO2 Dashboard Server 2.0.0
- WSO2 Enterprise Service Bus 5.0.0
- WSO2 Enterprise Mobility Manager 2.0.1
- WSO2 Enterprise Store 2.1.0
- WSO2 Governance Registry 5.3.0
- WSO2 Message Broker 3.1.0
The secondary JDBC user store connection test option in the management console of the above-mentioned WSO2 Servers exposes sensitive data in URL query parameters.
Testing the connection from the WSO2 server's management console while adding a secondary JDBC user store initiates an HTTP GET request, including the connection credentials in URL query parameters. Thus, database connection credentials get exposed and also get logged in HTTP access logs.
An attacker can steal database credentials and abuse the system if access is obtained to view access logs or browser history as all sensitive information to the respective connection including the credentials are exposed in HTTP access logs and URL query parameters.
For WSO2 Update Manager (WUM) Supported Products¶
Use WUM to update the following products.
|WSO2 API Manager
|WSO2 Enterprise Service Bus
For Other Products¶
Apply the following patches based on your products by following the instructions in the README file. Patches can also be downloaded from Security Patch Releases. If you have any questions, post them to email@example.com.
|WSO2 App Manager
|WSO2 Application Server
|WSO2 Business Process Server
|WSO2 Business Rules Server
|WSO2 Dashboard Server
|WSO2 Enterprise Mobility Manager
|WSO2 Enterprise Store
|WSO2 Governance Registry
|WSO2 Message Broker
If you are using newer versions of the products than the ones mentioned in the "SOLUTION" section, this vulnerability is fixed.