Security Advisory WSO2-2024-3490/CVE-2024-6429

Published: 2025-05-29

Version: 1.0.0

Severity: Medium

CVSS Score: 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)


AFFECTED PRODUCTS

  • WSO2 API Manager: 4.4.0, 4.3.0, 4.2.0, 4.1.0, 4.0.0, 3.2.1, 3.2.0
  • WSO2 Identity Server: 7.0.0, 6.1.0, 6.0.0, 5.11.0, 5.10.0
  • WSO2 Identity Server as Key Manager: 5.10.0

OVERVIEW

Content spoofing vulnerability.

DESCRIPTION

Due to incorrect error handling implementation, error messages are passed through the URL parameter under certain conditions, which can be tampered with by malicious actors.

IMPACT

By leveraging this vulnerability, malicious actors could perform social engineering attacks by replacing the actual error message as malicious content.

SOLUTION

Community Users (Open Source)

Apply the relevant fixes to your product using the public fix(es) provided below.

If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).

Support Subscription Holders

Update your product to the specified update level or a higher update level to apply the fix.

Info

WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.

Product Name Product Version U2 Update Level
WSO2 Identity Server as Key Manager 5.10.0 338
WSO2 API Manager 3.2.0 409
WSO2 API Manager 3.2.1 33
WSO2 API Manager 4.0.0 327
WSO2 API Manager 4.1.0 188
WSO2 API Manager 4.2.0 128
WSO2 API Manager 4.3.0 38
WSO2 API Manager 4.4.0 4
WSO2 Identity Server 5.10.0 314
WSO2 Identity Server 5.11.0 359
WSO2 Identity Server 6.0.0 203
WSO2 Identity Server 6.1.0 176
WSO2 Identity Server 7.0.0 48

REFERENCES

  • []