Security Advisory WSO2-2022-1910

Published: January 11, 2023

Version: 1.0.0

Severity: Medium

CVSS Score: 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)


AFFECTED PRODUCTS

  • WSO2 API Manager : 4.1.0 , 4.0.0 , 3.2.0 , 3.1.0 , 3.0.0
  • WSO2 IS as Key Manager : 5.10.0 , 5.9.0 , 5.7.0
  • WSO2 Identity Server : 5.11.0 , 5.10.0 , 5.9.0 , 5.8.0 , 5.7.0

OVERVIEW

Improper validation of reCAPTCHA for Secondary Userstore Users.

DESCRIPTION

Due to the improper implementation, the reCAPTCHA validation can be bypassed for the secondary user store users when SSO is enabled.

IMPACT

By leveraging this vulnerability, a malicious actor can bypass the reCAPTCHA validation and perform the brute force attacks against the vulnerable deployment.

SOLUTION

If the latest version of the affected WSO2 product is not mentioned under the affected product list, you may migrate to the latest version to receive security fixes. Otherwise you may apply the relevant fixes to the product based on the public fix:

Info

If you are a WSO2 customer with a support subscription, use WSO2 Updates in order to apply the fix.