Security Advisory WSO2-2020-0706

Published: May 13, 2020

Version: 1.0.0

Severity: High

CVSS Score: 8.7 (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N)


AFFECTED PRODUCTS

  • WSO2 API Manager : 3.0.0
  • WSO2 IS as Key Manager : 5.9.0

OVERVIEW

API Manager bypass JWT signature verification for cached API requests.

DESCRIPTION

A user can bypass the JWT signature verification and make a API request with any JWT claim value (with the previous signature), if the API is already invoked and the JWT signature is cached.

IMPACT

This vulnerability can lead to the exposure of API resources. Further, an attacker can do the unintended operations on API resources and harm.

SOLUTION

If you are using an affected product version, it is highly recommended to migrate to the latest released version to receive security fixes.

Otherwise, you may apply the relevant fixes to the product based on the public fix(s):

Info

If you are a WSO2 customer with a support subscription, use WSO2 Update Manager(WUM) updates in order to apply the fix to the affected versions.