Security Advisory WSO2-2017-0223

Published: July 10, 2017

Severity: Low

CVSS Score: 1.8 (CVSS:3.0/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)


AFFECTED PRODUCTS

  • WSO2 API Manager 2.1.0
  • WSO2 API Manager Analytics 2.1.0
  • WSO2 App Manager 1.2.0
  • WSO2 Application Server 5.3.0
  • WSO2 Business Process Server 3.6.0
  • WSO2 Business Rules Server 2.2.0
  • WSO2 Complex Event Processor 4.2.0
  • WSO2 Data Analytics Server 3.1.0
  • WSO2 Dashboard Server 2.0.0
  • WSO2 Data Services Server 3.5.1
  • WSO2 Enterprise Service Bus 5.0.0
  • WSO2 Enterprise Service Bus Analytics 5.0.0
  • WSO2 IoT Server 3.0.0
  • WSO2 Identity Server 5.3.0,
  • WSO2 Identity Server Analytics 5.3.0
  • WSO2 Machine Learner 1.2.0

OVERVIEW

The tenant creation page of the above WSO2 products, auto-completes the passwords in the user's web browser when the password is stored in the browser.

DESCRIPTION

When a new username and password are entered in the tenant creation form and the form is submitted, the browser asks if the password should be saved. Thereafter when the form is displayed, the username and password are filled in automatically or are completed as the username is entered.

This fix adds the autocomplete="off" HTML flag to the password fields of the tenant creation form to instruct browsers not to perform password autocomplete.

IMPACT

When the password field can be cached in the browser, an attacker with local access could obtain the cleartext password from the browser cache.

Info

Most modern browsers do not honor the autocomplete="off" HTML flag.

SOLUTION

The recommended solution is to apply relevant security updates/patches to products which fix the identified vulnerability in affected components.

See below for details on patching or updating the affected component.

Code Product Version Patch
AM WSO2 API Manager 2.1.0 WSO2-CARBON-PATCH-4.4.0-0867
AM-Analytics WSO2 API Manager Analytics 2.1.0 WSO2-CARBON-PATCH-4.4.0-0867
AppM WSO2 App Manager 1.2.0 WSO2-CARBON-PATCH-4.4.0-0867
AS WSO2 Application Server 5.3.0 WSO2-CARBON-PATCH-4.4.0-0880
BPS WSO2 Business Process Server 3.6.0 WSO2-CARBON-PATCH-4.4.0-0867
BRS WSO2 Business Rules Server 2.2.0 WSO2-CARBON-PATCH-4.4.0-0882
CEP WSO2 Complex Event Processor 4.2.0 WSO2-CARBON-PATCH-4.4.0-0867
DAS WSO2 Data Analytics Server 3.1.0 WSO2-CARBON-PATCH-4.4.0-0867
DS WSO2 Dashboard Server 2.0.0 WSO2-CARBON-PATCH-4.4.0-0882
DSS WSO2 Data Services Server 3.5.1 WSO2-CARBON-PATCH-4.4.0-0867
ESB WSO2 Enterprise Service Bus 5.0.0 WSO2-CARBON-PATCH-4.4.0-0867
ESB-Analytics WSO2 Enterprise Service Bus Analytics 5.0.0 WSO2-CARBON-PATCH-4.4.0-0867
IoT WSO2 IoT Server 3.0.0 WSO2-CARBON-PATCH-4.4.0-0906
IS WSO2 Identity Server Analytics 5.3.0 WSO2-CARBON-PATCH-4.4.0-0867
IS WSO2 Identity Server 5.3.0 WSO2-CARBON-PATCH-4.4.0-0906
ML WSO2 Machine Learner 1.2.0 WSO2-CARBON-PATCH-4.4.0-0867

Info

If you are using newer versions of the products than the ones mentioned in the "SOLUTION" section, this vulnerability is fixed.