Security Advisory WSO2-2022-1476¶
Published: December 14, 2022
CVSS Score: 7.2 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
- WSO2 API Manager : 2.6.0 , 3.0.0 , 3.1.0 , 3.2.0 , 4.0.0, 4.1.0
- WSO2 IS as Key Manager : 5.7.0 , 5.9.0 , 5.10.0
- WSO2 Identity Server : 5.7.0 , 5.8.0 , 5.9.0 , 5.10.0 , 5.11.0
Remote Code Execution on the server through adaptive authentication script.
For this vulnerability to have any impact on your deployment, the malicious actor should have one of the following permissions to exploit the vulnerability using Adaptive Authentication script:
If the malicious actor has /permission/admin/manage permission, the vulnerability can be exploited using function libraries. When the above preconditions are met, a malicious actor could gain access to the server by running malicious code.
There is no impact on your deployment if all the preconditions mentioned in the description section are not met. If preconditions are met, by leveraging this vulnerability, a malicious actor may gain Remote Code Execution on the server. By doing so, the server data is at a high-risk, resulting in an impact on confidentiality, integrity and availability of data.
If the latest version of the affected WSO2 product is not mentioned under the affected product list, you may migrate to the latest version to receive security fixes. Otherwise you may apply the relevant fixes to the product based on the public fix:
If you are a WSO2 customer with a support subscription, use WSO2 Updates in order to apply the fix.