Security Advisory WSO2-2016-0170

Published: November 08, 2016


AFFECTED PRODUCTS

  • WSO2 Application Server 5.3.0
  • WSO2 Business Rules Server 2.2.0
  • WSO2 Dashboard Server 2.0.0
  • WSO2 Enterprise Mobility Manager 2.0.1
  • WSO2 Message Broker 3.1.0

OVERVIEW

Apache Axis2 1.6.2 and earlier versions do not verify that the server hostname matches a domain name in the subject's Common Name (CN) or Subject Alternative Name (subjectAltName) field of the X.509 certificate.

DESCRIPTION

Apache Axis2 1.6.2 uses commons-httpclient-3.1.0 and hostname verification should be enabled in the commons-httpclient.

IMPACT

This allows Eavesdropper attackers to spoof SSL servers via an arbitrary valid certificate.

SOLUTION

Apply the following patches based on your products by following the instructions in the README file. Patches can also be downloaded from Security Patch Releases. If you have any questions, post them to security@wso2.com.

Code Product Version Patch
AS WSO2 Application Server 5.3.0 WSO2-CARBON-PATCH-4.4.0-0514
BRS WSO2 Business Rules Server 2.2.0 WSO2-CARBON-PATCH-4.4.0-0514
DS WSO2 Dashboard Server 2.0.0 WSO2-CARBON-PATCH-4.4.0-0514
EMM WSO2 Enterprise Mobility Manager 2.0.1 WSO2-CARBON-PATCH-4.4.0-0514
MB WSO2 Message Broker 3.1.0 WSO2-CARBON-PATCH-4.4.0-0514

Info

If you are using newer versions of the products than the ones mentioned in the "SOLUTION" section, this vulnerability is fixed.