Security Advisory WSO2-2019-0666

Published: April 04, 2020

Version: 1.0.0

Severity: Critical

CVSS Score: 10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)


AFFECTED PRODUCTS

  • WSO2 IS as Key Manager : 5.9.0 or earlier
  • WSO2 Identity Server : 5.9.0 or earlier

OVERVIEW

Providing improvement to the Server Side Request Forgery (SSRF) prevention and Cross-Site Scripting (XSS) prevention in the Shindig webapp.

DESCRIPTION

This vulnerability can be exploited by misusing the UI gadgets loading capability of the shindig web application. An attacker can alter a specific URL in the request causing the server to initiate a GET request to the altered URL. Cross-Site Scripting (XSS) vulnerability can be exploited by injecting the URL of the page carrying malicious script in the request URL parameters of shindig endpoint.

IMPACT

By exploiting SSRF vulnerability, an attacker can use the server to perform arbitrary external service interactions. This could be especially used to interact with the nodes of an internal network, which are otherwise hidden to the outside by the network rules. By leveraging an XSS attack, an attacker can make the browser get redirected to a malicious website, make changes in the UI of the web page, retrieve information from the browser or harm otherwise. However, since all the session related sensitive cookies are set with httpOnly flag and protected, session hijacking or similar attack would not be possible.

SOLUTION

If you are using an affected product version, it is highly recommended to migrate to the latest released version to receive security fixes.

As a temporary risk mitigation, you may disallow or limit access to the dashboard web application (https://<host-name>:9443/dashboard/) and shindig web application (https://<host-name>:9443/shindig/) available within the affected product versions.

Otherwise, you may apply the relevant fixes to the product based on the public fix(s):

Info

If you are a WSO2 customer with a support subscription, use WSO2 Update Manager(WUM) updates in order to apply the fix to the affected versions.