Security Advisory WSO2-2022-1476
Published: 14th December 2022
Version: 1.0.0
Severity: High
CVSS Score: 7.2 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
AFFECTED PRODUCTS
WSO2 API Manager : 2.6.0 , 3.0.0 , 3.1.0 , 3.2.0 , 4.0.0, 4.1.0
WSO2 IS as Key Manager : 5.7.0 , 5.9.0 , 5.10.0
WSO2 Identity Server : 5.7.0 , 5.8.0 , 5.9.0 , 5.10.0 , 5.11.0
OVERVIEW
Remote Code Execution on the server through adaptive authentication script.
DESCRIPTION
For this vulnerability to have any impact on your deployment, the malicious actor should have one of the following permissions to exploit the vulnerability using Adaptive Authentication script:
- /permission/admin/manage/identity/applicationmgt/create
- /permission/admin/manage/identity/applicationmgt/update
If the malicious actor has /permission/admin/manage permission, the vulnerability can be exploited using function libraries. When the above preconditions are met, a malicious actor could gain access to the server by running malicious code.
IMPACT
There is no impact on your deployment if all the preconditions mentioned in the description section are not met. If preconditions are met, by leveraging this vulnerability, a malicious actor may gain Remote Code Execution on the server. By doing so, the server data is at a high-risk, resulting in an impact on confidentiality, integrity and availability of data
SOLUTION
If the latest version of the affected WSO2 product is not mentioned under the affected product list, you may migrate to the latest version to receive security fixes. Otherwise you may apply the relevant fixes to the product based on the public fix:
- https://github.com/wso2/carbon-identity-framework/pull/3735
- https://github.com/wso2/carbon-identity-framework/pull/3607
- https://github.com/wso2/carbon-identity-framework/pull/3644
Note: If you are a WSO2 customer with Support Subscription, please use WSO2 Updates in order to apply the fix.