Security Advisory WSO2-2023-3098/CVE-2024-4412

Published: 2025-03-18

Version: 1.0.0

Severity: Low

CVSS Score: 2.7 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)

CVE IDs: CVE-2024-4412


AFFECTED PRODUCTS

  • WSO2 API Manager 4.3.0, 4.2.0, 4.1.0, 4.0.0, 3.2.1, 3.2.0, 3.1.0
  • WSO2 Enterprise Integrator 6.6.0
  • WSO2 Identity Server 7.0.0, 6.1.0, 6.0.0, 5.11.0, 5.10.0
  • WSO2 Identity Server as Key Manager 5.10.0
  • WSO2 Open Banking AM 2.0.0
  • WSO2 Open Banking IAM 2.0.0

OVERVIEW

Potential Expression Language (EL) injection vulnerability has been identified.

DESCRIPTION

Due to the lack of input validation in the user submitted data, a malicious actor may submit malicious code via user input and perform arbitrary operations on the deployment.

IMPACT

However, the malicious actor must have administrator privileges to exploit the identified vulnerable flow in WSO2 products. Additionally, successful exploitation has minimal impact on WSO2 products, as expression language usage is restricted to certain read operations.

SOLUTION

Community Users (Open Source)

Apply the relevant fixes to your product using the public fix(es) provided below.

If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).

Support Subscription Holders

Update your product to the specified update level—or a higher update level—to apply the fix.

Info

WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.

Product Version U2 Update Level
WSO2 API Manager 4.3.0 20
WSO2 API Manager 4.2.0 108
WSO2 API Manager 4.1.0 169
WSO2 API Manager 4.0.0 307
WSO2 API Manager 3.2.1 18
WSO2 API Manager 3.2.0 366
WSO2 API Manager 3.1.0 276
WSO2 Enterprise Integrator 6.6.0 205
WSO2 Identity Server 7.0.0 15
WSO2 Identity Server 6.1.0 149
WSO2 Identity Server 6.0.0 189
WSO2 Identity Server 5.11.0 337
WSO2 Identity Server 5.10.0 297
WSO2 Identity Server as Key Manager 5.10.0 293
WSO2 Open Banking AM 2.0.0 326
WSO2 Open Banking IAM 2.0.0 346

CREDITS

WSO2 thanks, Dawid Małecki for responsibly reporting the identified issue and working with us as we addressed it.