Security Advisory WSO2-2017-0223¶
Published: July 10, 2017
Severity: Low
CVSS Score: 1.8 (CVSS:3.0/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)
AFFECTED PRODUCTS¶
- WSO2 API Manager 2.1.0
- WSO2 API Manager Analytics 2.1.0
- WSO2 App Manager 1.2.0
- WSO2 Application Server 5.3.0
- WSO2 Business Process Server 3.6.0
- WSO2 Business Rules Server 2.2.0
- WSO2 Complex Event Processor 4.2.0
- WSO2 Data Analytics Server 3.1.0
- WSO2 Dashboard Server 2.0.0
- WSO2 Data Services Server 3.5.1
- WSO2 Enterprise Service Bus 5.0.0
- WSO2 Enterprise Service Bus Analytics 5.0.0
- WSO2 IoT Server 3.0.0
- WSO2 Identity Server 5.3.0,
- WSO2 Identity Server Analytics 5.3.0
- WSO2 Machine Learner 1.2.0
OVERVIEW¶
The tenant creation page of the above WSO2 products, auto-completes the passwords in the user's web browser when the password is stored in the browser.
DESCRIPTION¶
When a new username and password are entered in the tenant creation form and the form is submitted, the browser asks if the password should be saved. Thereafter when the form is displayed, the username and password are filled in automatically or are completed as the username is entered.
This fix adds the autocomplete="off"
HTML flag to the password fields of the tenant creation form to instruct browsers not to perform password autocomplete.
IMPACT¶
When the password field can be cached in the browser, an attacker with local access could obtain the cleartext password from the browser cache.
Info
Most modern browsers do not honor the autocomplete="off"
HTML flag.
SOLUTION¶
The recommended solution is to apply relevant security updates/patches to products which fix the identified vulnerability in affected components.
See below for details on patching or updating the affected component.
Code | Product | Version | Patch |
---|---|---|---|
AM | WSO2 API Manager | 2.1.0 | WSO2-CARBON-PATCH-4.4.0-0867 |
AM-Analytics | WSO2 API Manager Analytics | 2.1.0 | WSO2-CARBON-PATCH-4.4.0-0867 |
AppM | WSO2 App Manager | 1.2.0 | WSO2-CARBON-PATCH-4.4.0-0867 |
AS | WSO2 Application Server | 5.3.0 | WSO2-CARBON-PATCH-4.4.0-0880 |
BPS | WSO2 Business Process Server | 3.6.0 | WSO2-CARBON-PATCH-4.4.0-0867 |
BRS | WSO2 Business Rules Server | 2.2.0 | WSO2-CARBON-PATCH-4.4.0-0882 |
CEP | WSO2 Complex Event Processor | 4.2.0 | WSO2-CARBON-PATCH-4.4.0-0867 |
DAS | WSO2 Data Analytics Server | 3.1.0 | WSO2-CARBON-PATCH-4.4.0-0867 |
DS | WSO2 Dashboard Server | 2.0.0 | WSO2-CARBON-PATCH-4.4.0-0882 |
DSS | WSO2 Data Services Server | 3.5.1 | WSO2-CARBON-PATCH-4.4.0-0867 |
ESB | WSO2 Enterprise Service Bus | 5.0.0 | WSO2-CARBON-PATCH-4.4.0-0867 |
ESB-Analytics | WSO2 Enterprise Service Bus Analytics | 5.0.0 | WSO2-CARBON-PATCH-4.4.0-0867 |
IoT | WSO2 IoT Server | 3.0.0 | WSO2-CARBON-PATCH-4.4.0-0906 |
IS | WSO2 Identity Server Analytics | 5.3.0 | WSO2-CARBON-PATCH-4.4.0-0867 |
IS | WSO2 Identity Server | 5.3.0 | WSO2-CARBON-PATCH-4.4.0-0906 |
ML | WSO2 Machine Learner | 1.2.0 | WSO2-CARBON-PATCH-4.4.0-0867 |
Info
If you are using newer versions of the products than the ones mentioned in the "SOLUTION" section, this vulnerability is fixed.