Security Advisory WSO2-2020-0730
Published: 08th September 2020
Version: 1.0.0
Severity: Medium
CVSS Score: 4.2 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)
AFFECTED PRODUCTS
WSO2 Enterprise Integrator : 6.6.0 or earlier
OVERVIEW
A potential Cross-Site Request Forgery vulnerability has been identified in the Management Console.
DESCRIPTION
Adding a Message Store, loadBalanceEndpoint, templateEndpoint and recipientlistEndpoint by entering required details in the Management console is found to be vulnerable to a potential Cross-Site Request attacks.
IMPACT
By leveraging the CSRF vulnerability, an attacker may steal or manipulate customer session and cookies, which might be used to impersonate a legitimate user. It leads to allow the attacker to perform changes as a legitimate user.
SOLUTION
If you are using an affected product version, it is highly recommended to migrate to the latest released version to receive security fixes.
You may also apply the relevant fixes based on the changes from the public fix: https://github.com/wso2/carbon-mediation/pull/1389
Note: If you are a WSO2 customer with Support Subscription, please use WSO2 Update Manager (WUM) updates in order to apply the fix.