Security Advisory WSO2-2017-0197

Published: 4th September 04, 2017

Severity: Low

CVSS Score: 2.4 (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N)


AFFECTED PRODUCTS

  • WSO2 Business Rules Server 2.2.0
  • WSO2 Dashboard Server 2.0.0

OVERVIEW

A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Management Console.

DESCRIPTION

This vulnerability is discovered in the Add User Store page in the Management Console. However, exploiting the vulnerability remotely is not possible as the malicious script should be injected into a textbox after accessing the web page in the user's browser where the script would run as a result of a javascript event bound to the text box.

IMPACT

By leveraging an XSS attack, an attacker can make the browser get redirected to a malicious website, make changes in the UI of the web page, retrieve information from the browser or harm otherwise.

However, since all the session related sensitive cookies are set with httpOnly flag and protected, session hijacking or similar attack would not be possible.

SOLUTION

Apply the following patches based on your products by following the instructions in the README file. Patches can also be downloaded from Security Patch Releases. If you have any questions, post them to security@wso2.com.

Code Product Version Patch
BRS WSO2 Business Rules Server 2.2.0 WSO2-CARBON-PATCH-4.4.0-1174
DS WSO2 Dashboard Server 2.0.0 WSO2-CARBON-PATCH-4.4.0-1174

Info

If you are using newer versions of the products than the ones mentioned in the "SOLUTION" section, this vulnerability is fixed.