Security Advisory WSO2-2024-3382/CVE-2024-5139

Published: 2025-03-18

Updated: 2025-03-18

Version: 1.0.0

Severity: Medium

CVSS Score: 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)


AFFECTED PRODUCTS

  • WSO2 API Manager 4.3.0, 4.2.0, 4.1.0, 4.0.0, 3.2.1, 3.2.0, 3.1.0
  • WSO2 Enterprise Integrator 6.6.0
  • WSO2 Identity Server 7.0.0, 6.1.0, 6.0.0, 5.10.0
  • WSO2 Identity Server as Key Manager 5.10.0
  • WSO2 Open Banking AM 2.0.0
  • WSO2 Open Banking IAM 2.0.0

OVERVIEW

A reflected cross site scripting vulnerability.

DESCRIPTION

Due to lack of input encoding, a reflected Cross Site Scripting (XSS) attack can be carried out by injecting a malicious payload into the Authentication Endpoint.

IMPACT

By leveraging the XSS attack, a malicious actor can make the browser get redirected to a malicious website, make changes in the UI of the web page, retrieve information from the browser or harm otherwise. However, since all the session related sensitive cookies are set with httpOnly flag and protected, session hijacking or similar attacks would not be possible.

SOLUTION

Community Users (Open Source)

Apply the relevant fixes to your product using the public fix(es) provided below.

If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).

Support Subscription Holders

Update your product to the specified update level—or a higher update level—to apply the fix.

Info

WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.

Product Version U2 Update Level
WSO2 API Manager 4.3.0 6
WSO2 API Manager 4.2.0 91
WSO2 API Manager 4.1.0 159
WSO2 API Manager 4.0.0 299
WSO2 API Manager 3.2.1 10
WSO2 API Manager 3.2.0 376
WSO2 API Manager 3.1.0 286
WSO2 Enterprise Integrator 6.6.0 204
WSO2 Identity Server 7.0.0 64
WSO2 Identity Server 6.1.0 195
WSO2 Identity Server 6.0.0 212
WSO2 Identity Server 5.10.0 310
WSO2 Identity Server as Key Manager 5.10.0 306
WSO2 Open Banking AM 2.0.0 336
WSO2 Open Banking IAM 2.0.0 357

CREDITS

WSO2 thanks, Elmin for responsibly reporting the identified issue and working with us as we addressed it.