Security Advisory WSO2-2017-0218
Published: 06-03-2017
AFFECTED PRODUCTS
WSO2 API Manager 2.1.0
OVERVIEW
WSO2 API Manager Publisher and Store are vulnerable to a possible insider attack.
DESCRIPTION
When a reverse proxy is deployed in front of API Store/ API Publisher, it is required to expose /registry as well from the reverse proxy to view API icons/images. Due to this, an attacker can access other registry resources which are exposed from /registry.
IMPACT
An attacker with access to API Manager Publisher/ Store is able to browse registry once the registry resource paths are found from a local API Manager instance.
SOLUTION
Expose only the required registry resources other than exposing whole /registry from the reverse proxy.
Required registry resource path : /registry/resource/_system/governance/apimgt/applicationdata/icons/
Example:
Nginx server configurations
For API Publisher, the registry path below should be exposed in reverse proxy configurations.
location ~ ^/apimanager/publisher/(.*)registry/resource/_system/governance/apimgt/applicationdata/icons/(.*)$ { |
|---|
For API Store, registry path below should be exposed in reverse proxy configurations.
location ~ ^/apimanager/store/(.*)registry/resource/_system/governance/apimgt/applicationdata/icons/(.*)$ { |
|---|
NOTES
If you are using newer versions of the products than the ones mentioned in the “SOLUTION” section, this vulnerability is fixed.