||
Skip to end of metadata
Go to start of metadata
Published: 31st October 2016

AFFECTED PRODUCTS

WSO2 API Manager 2.0.0
WSO2 App Manager 1.2.0
WSO2 Application Server 5.3.0
WSO2 Business Process Server 3.6.0
WSO2 Business Rules Server 2.2.0
WSO2 Dashboard Server 2.0.0
WSO2 Enterprise Service Bus 5.0.0
WSO2 Enterprise Mobility Manager 2.0.1
WSO2 Enterprise Store 2.1.0
WSO2 Governance Registry 5.3.0
WSO2 Message Broker 3.1.0


OVERVIEW


Secondary JDBC user store connection test option in the management console of the above mentioned WSO2 Servers expose sensitive data in URL query parameters.
 

DESCRIPTION

Testing the connection from the WSO2 server’s management console while adding a secondary JDBC user store initiates a HTTP GET request, including the connection credentials in URL query parameters. Thus, database connection credentials get exposed and also gets logged in HTTP access logs.
 

IMPACT 

An attacker can steal database credentials and abuse the system if access is obtained to view access logs or browser history as all sensitive information to the respective connection including the credentials are exposed in HTTP access logs and URL query parameters.

 

SOLUTION

For WSO2 Update Manager (WUM) Supported Products

Please use WUM to update the following products.


Code

Product

Version

AMWSO2 API Manager2.0.0
ESBWSO2 Enterprise Service Bus5.0.0


For Other Products

Apply the following patches based on your product version by following the instructions in the README file. If you have any questions, post them to [email protected].

Please download the relevant patches based on the products you use following the matrix below. Patches can also be downloaded from http://wso2.com/security-patch-releases/.



Code

Product

Version

Patch

APPM

WSO2 App Manager

1.2.0

WSO2-CARBON-PATCH-4.4.0-0429

AS

WSO2 Application Server

5.3.0

WSO2-CARBON-PATCH-4.4.0-0432

BPS

WSO2 Business Process Server

3.6.0

WSO2-CARBON-PATCH-4.4.0-0429

BRS

WSO2 Business Rules Server

2.2.0

WSO2-CARBON-PATCH-4.4.0-0427

DS

WSO2 Dashboard Server

2.0.0

WSO2-CARBON-PATCH-4.4.0-0427

EMM

WSO2 Enterprise Mobility Manager

2.0.1

WSO2-CARBON-PATCH-4.4.0-0427

ES

WSO2 Enterprise Store

2.1.0

WSO2-CARBON-PATCH-4.4.0-0429

GREG

WSO2 Governance Registry

5.3.0

WSO2-CARBON-PATCH-4.4.0-0429

MB

WSO2 Message Broker

3.1.0

WSO2-CARBON-PATCH-4.4.0-0431


NOTES


If you are using newer versions of the products than the ones mentioned in the “SOLUTION” section, this vulnerability is fixed. 


  • No labels