Security Advisory WSO2-2023-2678

Published: 2025-03-18

Updated: 2025-03-18

Version: 1.0.0

Severity: Medium

CVSS Score: 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


AFFECTED PRODUCTS

  • WSO2 API Manager: 4.2.0, 4.1.0, 4.0.0, 3.2.0, 3.1.0
  • WSO2 Enterprise Integrator: 6.6.0
  • WSO2 Identity Server: 6.1.0, 6.0.0, 5.11.0, 5.10.0, 5.9.0, 5.8.0
  • WSO2 Identity Server as Key Manager: 5.10.0, 5.9.0
  • WSO2 Open Banking AM: 2.0.0
  • WSO2 Open Banking IAM: 2.0.0

OVERVIEW

A potential denial of service vulnerability.

DESCRIPTION

Due to lack of input validation in the AJAX processor, the request attribute counts could cause time and resource consuming repetitive processing (loops), which could result in denial of service.

IMPACT

Denial-of-Service (DoS) attacks have the potential to overwhelm the deployment, resulting in either partial or full service disruptions. Depending on the exploitation techniques and volume, the vulnerability could slow down accessibility to produce functions or, in more extreme cases, render the product unavailable.

SOLUTION

Community Users (Open Source)

We highly recommend to migrate to the latest version of respective WSO2 products to mitigate the identified vulnerabilities.

Support Subscription Holders

Update your product to the specified update level—or a higher update level—to apply the fix.

Info

WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.

Product Version U2 Update Level
WSO2 Enterprise Integrator 6.6.0 203
WSO2 API Manager 4.2.0 108
WSO2 API Manager 4.1.0 169
WSO2 API Manager 4.0.0 308
WSO2 API Manager 3.2.0 307
WSO2 API Manager 3.1.0 237
WSO2 API Manager 3.0.0 144
WSO2 Identity Server 6.1.0 23
WSO2 Identity Server 6.0.0 73
WSO2 Identity Server 5.11.0 242
WSO2 Identity Server 5.10.0 254
WSO2 Identity Server 5.9.0 132
WSO2 Identity Server 5.8.0 85
WSO2 Identity Server as Key Manager 5.10.0 245
WSO2 Identity Server as Key Manager 5.9.0 140
WSO2 Open Banking AM 2.0.0 278
WSO2 Open Banking IAM 2.0.0 296

CREDITS

WSO2 thanks, devme4f from VNPT-VCI for responsibly reporting the identified issue and working with us as we addressed it.