Security Advisory WSO2-2024-3465/CVE-2024-6423¶
Published: 2025-06-19
Version: 1.0.0
Severity: Medium
CVSS Score: 4.0 (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N)
CVE IDs: CVE-2024-6423
AFFECTED PRODUCTS¶
- WSO2 API Manager: 3.1.0, 3.2.0, 3.2.1, 4.0.0, 4.1.0, 4.2.0, 4.3.0, 4.4.0
- WSO2 Identity Server: 5.10.0, 5.11.0, 6.0.0, 6.1.0, 7.0.0
- WSO2 Identity Server as Key Manager: 5.10.0
- WSO2 Open Banking AM: 2.0.0
- WSO2 Open Banking IAM: 2.0.0
OVERVIEW¶
Security enhancements to block sensitive data from being sent via URL parameters.
DESCRIPTION¶
This update provides critical enhancements to WSO2 products by blocking the use of sending sensitive data via URL parameters in any flows. Although WSO2 products did not utilize sensitive data via URL parameters, users could forcefully send them this way, which could lead to sensitive data being logged in access logs.
IMPACT¶
WSO2 products did not use URL parameters to send sensitive data in any flows. However, if a user mistakenly used to send sensitive data to any flow, sensitive data could inadvertently be logged in access logs. This could lead to the exposure of confidential information, potentially compromising the security and privacy of the affected systems if the product was used incorrectly.
SOLUTION¶
Community Users (Open Source)¶
Apply the relevant fixes to your product using the public fix(es) provided below.
- https://github.com/wso2-extensions/identity-inbound-auth-oauth/pull/2510
- https://github.com/wso2/carbon-identity-framework/pull/5774/files
If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).
Support Subscription Holders¶
Update your product to the specified update level or a higher update level to apply the fix.
Info
WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.
| Product | Version | U2 Update Level |
|---|---|---|
| WSO2 API Manager | 3.1.0 | 313 |
| WSO2 API Manager | 3.2.0 | 406 |
| WSO2 API Manager | 3.2.1 | 30 |
| WSO2 API Manager | 4.0.0 | 324 |
| WSO2 API Manager | 4.1.0 | 185 |
| WSO2 API Manager | 4.2.0 | 124 |
| WSO2 API Manager | 4.3.0 | 36 |
| WSO2 API Manager | 4.4.0 | 2 |
| WSO2 Identity Server | 5.10.0 | 337 |
| WSO2 Identity Server | 5.11.0 | 384 |
| WSO2 Identity Server | 6.0.0 | 213 |
| WSO2 Identity Server | 6.1.0 | 211 |
| WSO2 Identity Server | 7.0.0 | 50 |
| WSO2 Identity Server as Key Manager | 5.10.0 | 329 |
| WSO2 Open Banking AM | 2.0.0 | 363 |
| WSO2 Open Banking IAM | 2.0.0 | 381 |
In addition to applying the U2 update or public PR, the following configurations should be also added to the deployment.toml file to complete the fix.
[request_parameters]
allow_sensitive_data_in_url = false