Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | N/A |
CWE-ID | CWE-94 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
WSO2 API Manager Web applications / Other software WSO2 Identity Server Analytics Web applications / Other software WSO2 API Manager Analytics Web applications / Other software WSO2 Enterprise Integrator Server applications / Other server solutions WSO2 Identity Server as Key Manager Server applications / Other server solutions WSO2 Micro Integrator Server applications / Other server solutions WSO2 IoT Server Server applications / Other server solutions WSO2 Micro Gateway Server applications / Other server solutions WSO2 Data Analytics Server Server applications / Other server solutions WSO2 Identity Server Server applications / Directory software, identity management |
Vendor | WSO2 Inc. |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU72520
Risk: Low
CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Management Console. A remote administrator on the local network can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWSO2 API Manager: 2.2.0 - 4.1.0
WSO2 Enterprise Integrator: 6.2.0 - 6.6.0
WSO2 Identity Server as Key Manager: 5.5.0 - 5.10.0
WSO2 Identity Server: 5.5.0 - 5.11.0
WSO2 Micro Integrator: 1.0.0 - 4.0.0
WSO2 Identity Server Analytics: 5.5.0 - 5.6.0
WSO2 API Manager Analytics: 5.2.0 - 5.5.0
WSO2 IoT Server: 3.3.1
WSO2 Micro Gateway: 2.2.0
WSO2 Data Analytics Server: 3.2.0
External linkshttp://docs.wso2.com/display/Security/Security+Advisory+WSO2-2022-1821
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.