Security Advisory WSO2-2017-0266¶
Published: December 02, 2019
CVSS Score: 5.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L)
- WSO2 API Manager
A potential Unvalidated Redirect vulnerability has been identified in the web app info page (Web app listing) of the carbon console.
Open Redirect vulnerability is discovered in the web app info page, where the page will be redirected directly to the URL using the defaultHostname in the request payload which can be a malicious one.
An attacker can modify the defaultHostname to a hostname value of a malicious site, and trick a user to invoke the modified URL. This redirects the user to the malicious site and the attacker may successfully launch a phishing scam and steal user credentials or other sensitive information.
The recommended solution is to remove org.wso2.carbon.webapp.list.ui jar file from <API-M_HOME>/repository/components/plugins.
If you are using newer versions of affected products than the ones mentioned in the SOLUTION section, this vulnerability is fixed.
It is highly recommended to migrate older versions of the WSO2 products to the latest released version to receive security fixes.