Security Advisory WSO2-2019-0501
Published: 29th January 2019
CVE-2018-20736
Severity: Low
CVSS Score: 3.5 (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N)
WSO2 API Manager 2.6.0
API Store is vulnerable to a potential Stored Cross-Site Scripting (XSS) vulnerability.
The XSS vulnerability is discovered in the Forum feature of the Store application.
The exploitability of the vulnerabilities is less as there are multiple steps associated in the flow. In the event of a successful attack, the injected script would get executed in the user's browser, which may generate malicious page results that would mislead the victim or harm otherwise.
Apply the following patches based on your product version by following the instructions in the README file. If you have any questions, post them to security@wso2.com.
Please download the relevant patches based on the products you use following the matrix below. Patches can also be downloaded from http://wso2.com/security-patch-releases/.
Code | Product | Version | Patch |
AM | WSO2 API Manager | 2.6.0 |
Note: If you are a WSO2 customer with Support Subscription, please use WSO2 Update Manager (WUM) updates in order to apply the fix. These patches are intended for WSO2 community (free) users.
NOTES
If you are using newer versions of the products than the ones mentioned in the “SOLUTION” section, this vulnerability is fixed.
CREDITS
WSO2 thanks, Julien Oury--Nogues for responsibly reporting the identified issues and working with us as we addressed them.