Security Advisory WSO2-2017-0197

Published: 4th September 04, 2017

Severity: Low

CVSS Score: 2.4 (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N)


  • WSO2 Business Rules Server 2.2.0
  • WSO2 Dashboard Server 2.0.0


A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Management Console.


This vulnerability is discovered in the Add User Store page in the Management Console. However, exploiting the vulnerability remotely is not possible as the malicious script should be injected into a textbox after accessing the web page in the user's browser where the script would run as a result of a javascript event bound to the text box.


By leveraging an XSS attack, an attacker can make the browser get redirected to a malicious website, make changes in the UI of the web page, retrieve information from the browser or harm otherwise.

However, since all the session related sensitive cookies are set with httpOnly flag and protected, session hijacking or similar attack would not be possible.


Apply the following patches based on your products by following the instructions in the README file. Patches can also be downloaded from Security Patch Releases. If you have any questions, post them to

Code Product Version Patch
BRS WSO2 Business Rules Server 2.2.0 WSO2-CARBON-PATCH-4.4.0-1174
DS WSO2 Dashboard Server 2.0.0 WSO2-CARBON-PATCH-4.4.0-1174


If you are using newer versions of the products than the ones mentioned in the "SOLUTION" section, this vulnerability is fixed.