Security Advisory WSO2-2024-3490/CVE-2024-6429¶
Published: 2025-05-29
Version: 1.0.0
Severity: Medium
CVSS Score: 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)
AFFECTED PRODUCTS¶
- WSO2 API Manager: 4.4.0, 4.3.0, 4.2.0, 4.1.0, 4.0.0, 3.2.1, 3.2.0
- WSO2 Identity Server: 7.0.0, 6.1.0, 6.0.0, 5.11.0, 5.10.0
- WSO2 Identity Server as Key Manager: 5.10.0
OVERVIEW¶
Content spoofing vulnerability.
DESCRIPTION¶
Due to incorrect error handling implementation, error messages are passed through the URL parameter under certain conditions, which can be tampered with by malicious actors.
IMPACT¶
By leveraging this vulnerability, malicious actors could perform social engineering attacks by replacing the actual error message as malicious content.
SOLUTION¶
Community Users (Open Source)¶
Apply the relevant fixes to your product using the public fix(es) provided below.
If applying the fix or update is not feasible, migrate to the latest unaffected version of the respective WSO2 product(s).
Support Subscription Holders¶
Update your product to the specified update level or a higher update level to apply the fix.
Info
WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.
Product Name | Product Version | U2 Update Level |
---|---|---|
WSO2 Identity Server as Key Manager | 5.10.0 | 338 |
WSO2 API Manager | 3.2.0 | 409 |
WSO2 API Manager | 3.2.1 | 33 |
WSO2 API Manager | 4.0.0 | 327 |
WSO2 API Manager | 4.1.0 | 188 |
WSO2 API Manager | 4.2.0 | 128 |
WSO2 API Manager | 4.3.0 | 38 |
WSO2 API Manager | 4.4.0 | 4 |
WSO2 Identity Server | 5.10.0 | 314 |
WSO2 Identity Server | 5.11.0 | 359 |
WSO2 Identity Server | 6.0.0 | 203 |
WSO2 Identity Server | 6.1.0 | 176 |
WSO2 Identity Server | 7.0.0 | 48 |
REFERENCES¶
- []