SECURITY ADVISORY WSO2-2024-3566/CVE-2024-7074¶
Published: November 10, 2024
Version: 1.0.0
Severity: Medium
CVSS Score: 6.8 (CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
AFFECTED PRODUCTS¶
- WSO2 API Manager 4.3.0, 4.2.0, 4.1.0, 4.0.0, 3.2.1, 3.2.0, 3.1.0, 3.0.0, 2.6.0, 2.5.0, 2.2.0, 2.1.0, 2.0.0
- WSO2 Enterprise Integrator 6.6.0, 6.5.0, 6.4.0, 6.3.0, 6.2.0, 6.1.1, 6.1.0, 6.0.0
- WSO2 Enterprise Service Bus 5.0.0, 4.9.0
- WSO2 Micro Integrator 1.0.0
OVERVIEW¶
Authenticated arbitrary file upload via SOAP admin service.
DESCRIPTION¶
Due to improper validation of user input, a malicious actor could upload an arbitrary file to a user controlled location of the server. By leveraging the arbitrary file upload vulnerability, it is further possible to gain remote code execution on the server. However, malicious actors require admin privileges to exploit this vulnerability
IMPACT¶
By leveraging the vulnerability, a malicious actor with admin privileges may perform remote code execution by uploading a specially crafted payload.
SOLUTION¶
If the latest version of the affected WSO2 product is not mentioned under the affected product list, you may migrate to the latest version to receive security fixes. Otherwise you may apply the relevant fixes to the product based on the public fix:
Info
If you are a WSO2 customer with Support Subscription, please use WSO2 Updates in order to apply the fix.
CREDITS¶
WSO2 thanks, Anonymous working with Trend Micro Zero Day Initiative for responsibly reporting the identified issue and working with us as we addressed it.