Published: 8th November 2016
WSO2 API Manager 2.0.0
WSO2 App Manager 1.2.0
WSO2 Business Rules Server 2.2.0
WSO2 Dashboard Server 2.0.0
WSO2 Enterprise Mobility Manager 2.0.1
WSO2 Enterprise Store 2.1.0
WSO2 Governance Registry 5.3.0
WSO2 Message Broker 3.1.0
The above WSO2 products are vulnerable to XML External Entity Processing (XXE), reflected Cross Site Scripting (XSS) and stored XSS attacks.
An attacker with access to the WSO2 Management Console can input a malicious XXE script in the try-it tool UI menu or can directly attack with xml input and disclose any file located in the file system.
The reflected and stored XSS vulnerabilities allow deployment of malicious code in the application by means of providing specifically crafted url to a user.
In addition to that, reflected and stored XSS vulnerabilities enable attackers to inject client side scripts into some pages in the Management Console. This reflects the attack back to the user’s browser and will execute the injected code, which may generate malicious page results that will mislead the victim or harm otherwise.
For WSO2 Update Manager (WUM) Supported Products
Please use WUM to update the following product.
WSO2 API Manager
For Other Products
Apply the following patches based on your product version by following the instructions in the README file. If you have any questions, post them to [email protected].
Please download the relevant patches based on the products you use following the matrix below. Patches can also be downloaded from http://wso2.com/security-patch-releases/.
WSO2 App Manager
WSO2 Business Rules Server
WSO2 Dashboard Server
WSO2 Enterprise Mobility Manager
WSO2 Enterprise Store
WSO2 Governance Registry
WSO2 Message Broker
If you are using newer versions of the products than the ones mentioned in the “SOLUTION” section, this vulnerability is fixed.