SECURITY ADVISORY WSO2-2023-2988

Published: May 31, 2024

Version: 1.0.0

Severity: High

CVSS Score: 7.2 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)


AFFECTED PRODUCTS

  • WSO2 API Manager : 4.2.0, 4.1.0, 4.0.0, 3.2.0, 3.1.0

OVERVIEW

Unrestricted arbitrary file upload, and remote code to execution vulnerability.

DESCRIPTION

Due to improper validation of user input in “Add API Documentation” feature, a malicious actor with following permission could upload an arbitrary file to a user controlled location of the server. * /permission/admin/login * /permission/admin/manage/api/publish

By leveraging the arbitrary file upload vulnerability, it is further possible to gain remote code execution on the server.

IMPACT

By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.

SOLUTION

If the latest version of the affected WSO2 product is not mentioned under the affected product list, you may migrate to the latest version to receive security fixes. Otherwise you may apply the relevant fixes to the product based on the public fix:

Info

If you are a WSO2 customer with Support Subscription, please use WSO2 Updates in order to apply the fix.

CREDITS

WSO2 thanks, Siebene@ for responsibly reporting the identified issue and working with us as we addressed it.