Security Advisory WSO2-2017-0261¶
Published: September 04, 2017
CVSS Score: 2.4 (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N)
- WSO2 Identity Server 5.3.0
A potential Stored Cross-Site Scripting (XSS) vulnerability has been discovered in the Management Console.
A Stored XSS attack could be performed in the Management Console by sending an HTTP POST request with a harmful script which gets stored in the database and later gets executed when trying to perform a UI action based on that data.
This has been possible due to the unavailability of proper encoding for the fields displayed in the web page.
By performing a Stored XSS attack, an attacker can make the browser get redirected to a malicious website, make changes in the UI of the web page, retrieve information from the browser or harm otherwise. However, since all the session related sensitive cookies are set with httpOnly flag and protected, session hijacking or similar attack would not be possible.
Apply the following patches based on your product version by following the instructions in the README file. If you have any questions, post them to email@example.com.
Download the relevant patches based on the products you use following the matrix below. Patches can also be downloaded from Security Patch Releases.
|WSO2 Identity Server
If you are using newer versions of the products than the ones mentioned in the "SOLUTION" section, this vulnerability is fixed.