SECURITY ADVISORY WSO2-2024-3573/CVE-2024-7096¶
Published: November 10, 2024
Version: 1.0.0
Severity: Medium
CVSS Score: 4.2 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)
AFFECTED PRODUCTS¶
- WSO2 API Manager 4.3.0, 4.2.0, 4.1.0, 4.0.0, 3.2.1, 3.2.0, 3.1.0, 3.0.0, 2.6.0, 2.5.0,2.2.0, 2.1.0, 2.0.0
- WSO2 Identity Server 7.0.0, 6.1.0, 6.0.0, 5.11.0, 5.10.0, 5.9.0, 5.8.0, 5.7.0, 5.6.0,5.5.0, 5.4.1, 5.4.0, 5.3.0, 5.2.0
- WSO2 Identity Server as Key Manager 5.10.0, 5.9.0, 5.7.0, 5.6.0, 5.5.0, 5.3.0
OVERVIEW¶
Potential privilege escalation vulnerabilities via SOAP admin service.
DESCRIPTION¶
Due to a business logic error, a malicious actor can potentially create a new user with elevated permissions if the following conditions are met: * SOAP admin services are accessible to the malicious actor. * The deployment includes an attribute used for internal purposes, which is not included by default in WSO2 products. * The deployment includes at least one custom role which has a permission that is not included by default in WSO2 Products. * The malicious actor has knowledge of the custom role, and the attribute created in the deployment.
IMPACT¶
By exploiting this vulnerability, malicious actors may obtain higher privileges for self-registered users when prerequisites mentioned in the description section are met.
SOLUTION¶
If the latest version of the affected WSO2 product is not mentioned under the affected product list, you may migrate to the latest version to receive security fixes. Otherwise you may apply the relevant fixes to the product based on the public fix:
Info
If you are a WSO2 customer with Support Subscription, please use WSO2 Updates in order to apply the fix.