Security Advisory WSO2-2016-0169¶
Published: November 08, 2016
- WSO2 API Manager 2.0.0
- WSO2 App Manager 1.2.0
- WSO2 Business Rules Server 2.2.0
- WSO2 Dashboard Server 2.0.0
- WSO2 Enterprise Mobility Manager 2.0.1
- WSO2 Enterprise Store 2.1.0
- WSO2 Governance Registry 5.3.0
- WSO2 Message Broker 3.1.0
The above WSO2 products are vulnerable to XML External Entity Processing (XXE), reflected Cross-Site Scripting (XSS) and stored XSS attacks.
An attacker with access to the WSO2 Management Console can input a malicious XXE script in the try-it tool UI menu or can directly attack with XML input and disclose any file located in the file system.
The reflected and stored XSS vulnerabilities allow the deployment of malicious code in the application by means of providing a specifically crafted URL to a user.
The XXE vulnerability allows reading an arbitrary file on an underlying operating system for users having access to the Management Console, or even facilitating Server Side Request Forgery attacks.
In addition to that, reflected and stored XSS vulnerabilities enable attackers to inject client-side scripts into some pages in the Management Console. This reflects the attack back to the user’s browser and will execute the injected code, which may generate malicious page results that will mislead the victim or harm otherwise.
For WSO2 Update Manager (WUM) Supported Products¶
Use WUM to update the following products.
|WSO2 API Manager
For Other Products¶
Apply the following patches based on your products by following the instructions in the README file. Patches can also be downloaded from Security Patch Releases. If you have any questions, post them to email@example.com.
|WSO2 App Manager
|WSO2 Business Rules Server
|WSO2 Dashboard Server
|WSO2 Enterprise Mobility Manager
|WSO2 Enterprise Store
|WSO2 Governance Registry
|WSO2 Message Broker
If you are using newer versions of the products than the ones mentioned in the "SOLUTION" section, this vulnerability is fixed.