Published: 04th Novemeber 2019
CVSS Score: 6.1 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
WSO2 API Manager
A potential Unvalidated Redirect vulnerability has been identified in the web app info page (Web app listing) of the carbon console.
Open Redirect vulnerability is discovered in the web app info page, where the page will be redirected directly to the URL using the 'defaultHostname' in the request payload which can be a malicious one.
An attacker can modify the 'defaultHostname' to a hostname value of a malicious site, and trick a user to invoke the modified URL. This redirects the user to the malicious site and the attacker may successfully launch a phishing scam and steal user credentials or other sensitive information.
The recommended solution is to remove 'org.wso2.carbon.webapp.list.ui' jar file from <API-M_HOME>/repository/components/plugins.
If you are using newer versions of affected products than the ones mentioned in the “SOLUTION” section, this vulnerability is fixed.
It is highly recommended to migrate older versions of the WSO2 products to the latest released version to receive security fixes.