Security Advisory WSO2-2017-0289

Published: August 01, 2019

Severity: Critical

CVSS Score: 10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)


AFFECTED PRODUCTS

  • WSO2 Identity Server : 5.2.0 , 5.3.0 , 5.4.0 , 5.4.1 , 5.5.0 , 5.6.0 , 5.7.0
  • WSO2 IS as Key Manager : 5.3.0 , 5.5.0 , 5.6.0 , 5.7.0

OVERVIEW

Providing improvement to the Server Side Request Forgery (SSRF) prevention in the Shindig webapp.

DESCRIPTION

This vulnerability can be exploited by misusing the UI gadgets loading capability of the shindig web application. An attacker can alter a specific URL in the request causing the server to initiate a GET request to the altered URL.

IMPACT

By exploiting this vulnerability, an attacker can use the server to perform arbitrary external service interactions. This could be specially used to interact with the nodes of an internal network, which are otherwise hidden from the outside by the network rules. An attacker can leverage this to footprint and reconnaissance a network, and in addition to that, if there are internal endpoints that do state changing operations upon GET requests, then it is possible to violate the integrity of them well. Depending on the level of protection enforced at endpoints, the impact of this vulnerability may vary.

SOLUTION

Upgrade the product 5.8.0 or a higher version, which is not affected by this SSRF vulnerability. If you have any questions, post them to security@wso2.com.

Info

If you are a WSO2 customer with a support subscription, use WSO2 Update Manager (WUM) updates in order to apply the fix. This patch is intended for WSO2 community (free) users.

CREDITS

WSO2 thanks, Abdulrahman Nour (redforce.io) for responsibly reporting the identified issue and working with us as we addressed them.