Remote code execution in WSO2 products



Published: 2023-02-23
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID N/A
CWE-ID CWE-94
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
WSO2 API Manager
Web applications / Other software

WSO2 Identity Server Analytics
Web applications / Other software

WSO2 API Manager Analytics
Web applications / Other software

WSO2 Enterprise Integrator
Server applications / Other server solutions

WSO2 Identity Server as Key Manager
Server applications / Other server solutions

WSO2 Micro Integrator
Server applications / Other server solutions

WSO2 IoT Server
Server applications / Other server solutions

WSO2 Micro Gateway
Server applications / Other server solutions

WSO2 Data Analytics Server
Server applications / Other server solutions

WSO2 Identity Server
Server applications / Directory software, identity management

Vendor WSO2 Inc.

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Code Injection

EUVDB-ID: #VU72520

Risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in the Management Console. A remote administrator on the local network can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

WSO2 API Manager: 2.2.0 - 4.1.0

WSO2 Enterprise Integrator: 6.2.0 - 6.6.0

WSO2 Identity Server as Key Manager: 5.5.0 - 5.10.0

WSO2 Identity Server: 5.5.0 - 5.11.0

WSO2 Micro Integrator: 1.0.0 - 4.0.0

WSO2 Identity Server Analytics: 5.5.0 - 5.6.0

WSO2 API Manager Analytics: 5.2.0 - 5.5.0

WSO2 IoT Server: 3.3.1

WSO2 Micro Gateway: 2.2.0

WSO2 Data Analytics Server: 3.2.0

External links

http://docs.wso2.com/display/Security/Security+Advisory+WSO2-2022-1821


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###