SECURITY ADVISORY CVE-2024-0392/WSO2-2023-2987

Published: June 25, 2024

Version: 1.0.0

Severity: Medium

CVSS Score: 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L


AFFECTED PRODUCTS

  • WSO2 Enterprise Integrator 6.6.0

Info

Please note that this announcement includes only the product versions affected as per our backporting policy.

OVERVIEW

Cross Site Request Forgery vulnerability has been identified in the management console.

DESCRIPTION

Due to the absence of CSRF-Token implementation, malicious actors may conduct CSRF attacks against few state-changing operations in the management console.

IMPACT

If exploited, this vulnerability could result in unauthorized actions on behalf of users, affecting account settings and data integrity. It's important to note that the identified vulnerability only impacts a limited set of state-changing operations. Additionally, exploiting this vulnerability requires a social engineering effort to target the user with management console access.

SOLUTION

Commercial Users

Update your product to the specified update level—or a higher update level—to apply the fix.

Info

If you are a WSO2 customer with Support Subscription, please use WSO2 Updates in order to apply the fix.

Product Name Product Version U2 Update Level
wso2ei 6.6.0 179

For All Users

If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).

CREDITS

WSO2 thanks, Toqa Hassib - Cyber Security Consultant at Inovasys for responsibly reporting the identified issue and working with us as we addressed it.

REFERENCES

https://www.cve.org/CVERecord?id=CVE-2024-0392