SECURITY ADVISORY CVE-2024-2321/WSO2-2024-3213

Published: November 10, 2024

Version: 1.0.0

Severity: Medium

CVSS Score: 5.6 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)


AFFECTED PRODUCTS

  • WSO2 API Manager : 4.2.0, 4.1.0, 4.0.0
  • WSO2 Identity Server : 6.1.0, 6.0.0, 5.11.0

Info

Please note that this announcement includes only the product versions affected as per our backporting policy.

OVERVIEW

APIs can be accessed without the session cookies in the certain condition.

DESCRIPTION

Given the malicious actor has access to a valid refresh token of an admin user, due to the improper authorization check and token mapping, application’s protected APIs can be accessed without the session cookie.

IMPACT

This behavior could potentially allow a malicious actor to access the API resource if they obtain the refresh token of the admin through any means, especially considering that refresh tokens typically have a longer expiration time compared to access tokens.

SOLUTION

Commercial Users

Update your product to the specified update level—or a higher update level—to apply the fix.

Info

If you are a WSO2 customer with Support Subscription, please use WSO2 Updates in order to apply the fix.

Product Name Product Version U2 Update Level
wso2am 4.0.0 275
wso2am 4.1.0 153
wso2am 4.2.0 83
wso2is 5.11.0 326
wso2is 6.0.0 172
wso2is 6.1.0 130

For All Users

If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).