||
Skip to end of metadata
Go to start of metadata

Published: 30th September 2016


AFFECTED PRODUCTS

WSO2 API Manager 2.0.0

WSO2 Application Server 5.3.0

WSO2 Business Rules Server 2.2.0

WSO2 Data Services Server 3.5.0

WSO2 Message Broker 3.1.0


OVERVIEW

Message Flows UI of above WSO2 products is vulnerable to reflected XSS attacks.


DESCRIPTION

Two XSS vulnerabilities were discovered in the Message Flows component. An attacker can possibly attack the management console, via that component, using reflected XSS. He can inject malicious scripts as a part of the URL which will be reflected in that component’s pages.

 

IMPACT

An attacker aware of the management console origin can include malicious content in a request to Message Flows page and trick a user to click the malicious content via email or a neutral web site. This reflects the attack back to the user’s browser and will execute the injected code, which may generate malicious page results that will mislead the victim or harm otherwise.


SOLUTION

Apply the following patches based on your product versions by following the instructions in the README file. Patches can also be downloaded from http://wso2.com/security-patch-releases/.

If you have any questions, please post them to [email protected].

Please download the relevant patches based on the products you use following the matrix below.


CodeProductVersionPatch
AMWSO2 API Manager2.0.0WSO2-CARBON-PATCH-4.4.0-0420
ASWSO2 Application Server5.3.0WSO2-CARBON-PATCH-4.4.0-0382
BRSWSO2 Business Rules Server2.2.0WSO2-CARBON-PATCH-4.4.0-0386
DSSWSO2 Data Services Server3.5.0WSO2-CARBON-PATCH-4.4.0-0385
MBWSO2 Message Broker3.1.0WSO2-CARBON-PATCH-4.4.0-0386



  • No labels