Security Advisory WSO2-2022-1910¶
Published: January 11, 2023
Version: 1.0.0
Severity: Medium
CVSS Score: 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)
AFFECTED PRODUCTS¶
- WSO2 API Manager : 4.1.0 , 4.0.0 , 3.2.0 , 3.1.0 , 3.0.0
- WSO2 IS as Key Manager : 5.10.0 , 5.9.0 , 5.7.0
- WSO2 Identity Server : 5.11.0 , 5.10.0 , 5.9.0 , 5.8.0 , 5.7.0
OVERVIEW¶
Improper validation of reCAPTCHA for Secondary Userstore Users.
DESCRIPTION¶
Due to the improper implementation, the reCAPTCHA validation can be bypassed for the secondary user store users when SSO is enabled.
IMPACT¶
By leveraging this vulnerability, a malicious actor can bypass the reCAPTCHA validation and perform the brute force attacks against the vulnerable deployment.
SOLUTION¶
If the latest version of the affected WSO2 product is not mentioned under the affected product list, you may migrate to the latest version to receive security fixes. Otherwise you may apply the relevant fixes to the product based on the public fix:
- https://github.com/wso2-extensions/identity-governance/pull/589
- https://github.com/wso2-extensions/identity-governance/pull/606
Info
If you are a WSO2 customer with a support subscription, use WSO2 Updates in order to apply the fix.