||
Skip to end of metadata
Go to start of metadata

Published: 4th September 2017

Severity: Medium

CVSS Score: 6.1 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)


AFFECTED PRODUCTS


WSO2 Application Server 5.3.0

WSO2 Business Process Server 3.6.0

WSO2 Business Rules Server 2.2.0

WSO2 Complex Event Processor 4.2.0

WSO2 Dashboard Server 2.0.0

WSO2 Data Analytics Server 3.1.0

WSO2 Data Services Server 3.5.1

WSO2 Machine Learner 1.2.0


OVERVIEW


A potential Stored Cross Site Scripting (XSS) vulnerability is detected in a JavaScript utility used for displaying messages in the Management Console.


DESCRIPTION


A stored XSS attack could be performed in the Management Console by filling a form field with a harmful script and later executing it when trying to perform a UI action based on that data.

This has been possible due to the utility JavaScript function used to display the pop messages related to that UI action has not been properly encoded to prevent XSS.


IMPACT 


By performing a Stored XSS attack, an attacker can make the browser get redirected to a malicious website, make changes in the UI of the web page, retrieve information from the browser or harm otherwise. However, since all the session related sensitive cookies are set with httpOnly flag and protected, session hijacking or similar attack would not be possible.


SOLUTION


Apply the following patches based on your product version by following the instructions in the README file. If you have any questions, post them to [email protected].

Please download the relevant patches based on the products you use following the matrix below. Patches can also be downloaded from http://wso2.com/security-patch-releases/.



NOTES


If you are using newer versions of the products than the ones mentioned in the “SOLUTION” section, this vulnerability is fixed.


  • No labels