SECURITY ADVISORY WSO2-2022-2208¶
Published: May 31, 2024
Version: 1.0.0
Severity: High
CVSS Score: 8.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L)
AFFECTED PRODUCTS¶
- WSO2 API Manager : 4.1.0, 4.0.0, 3.2.0, 3.1.0
OVERVIEW¶
JWT signature validation ignored when JWKS endpoint is unavailable.
DESCRIPTION¶
When validating JWTs generated by external OAuth providers 1, if JWKS endpoint call fails due to a network issue, or returns an unexpected response, the JWT token is considered to be valid.
IMPACT¶
This vulnerability only affected deployments that use JWTs generated by external OAuth providers to authenticate APIs. Since the JWT token is considered to be valid when the specific condition highlighted in the Description is met, the backend call is made without doing the signature validation.
SOLUTION¶
If the latest version of the affected WSO2 product is not mentioned under the affected product list, you may migrate to the latest version to receive security fixes. Otherwise you may apply the relevant fixes to the product based on the public fix:
Info
If you are a WSO2 customer with Support Subscription, please use WSO2 Updates in order to apply the fix.