Security Advisory WSO2-2017-0190¶
Published: March 06, 2017
- WSO2 Complex Event Processor 4.2.0
- WSO2 Data Analytics Server 3.1.0
- WSO2 Enterprise Service Bus Analytics 5.0.0
A potential Reflected XSS vulnerability exists in the Event Simulator, Event Tracer and Template Manager components of the above-listed products.
In several versions of Event Simulator, Event Tracer and Template manager components, potential reflected Cross-Site-Scripting vulnerability has been discovered.
An attacker aware of the management console origin can include malicious content in a request and trick a user to click the malicious content via email or a neutral website. This reflects the attack back to the user’s browser and will execute the injected code, which may generate malicious page results that will mislead the victim or harm otherwise.
The recommended solution is to apply provided patches or updates for affected components. Please refer below details on patching or updating the affected component.
For WSO2 Update Manager (WUM) Supported Products¶
Use WUM to update the following products.
|CEP||WSO2 Complex Event Processor||4.2.0|
|ESB||WSO2 Enterprise Service Bus||5.0.0|
For Other Products¶
Apply the following patches based on your products by following the instructions in the README file. Patches can also be downloaded from Security Patch Releases. If you have any questions, post them to email@example.com.
|CEP||WSO2 Complex Event Processor||4.2.0||WSO2-CARBON-PATCH-4.4.0-0745|
|DAS||WSO2 Data Analytics Server||3.1.0||WSO2-CARBON-PATCH-4.4.0-0745|
|ESB Analytics||WSO2 Enterprise Service Bus Analytics||5.0.0||WSO2-CARBON-PATCH-4.4.0-0614|
If you are using newer versions of the products than the ones mentioned in the "SOLUTION" section, this vulnerability is fixed.
WSO2 thanks, Marcin Woloszyn for responsibly reporting the identified issues and working with us as we addressed them.