||
Skip to end of metadata
Go to start of metadata

Published: 1st August 2019

Severity: Critical

CVSS Score: 10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)


AFFECTED PRODUCTS

WSO2 Identity Server         : 5.2.0 , 5.3.0 , 5.4.0 , 5.4.1 , 5.5.0 , 5.6.0 , 5.7.0

WSO2 IS as Key Manager  : 5.3.0 , 5.5.0 , 5.6.0 , 5.7.0


OVERVIEW

Providing improvement to the Server Side Request Forgery (SSRF) prevention in the Shindig webapp.


DESCRIPTION

This vulnerability can be exploited by misusing the UI gadgets loading capability of the shindig web application. An attacker can alter a specific URL in the request causing the server to initiate a GET request to the altered URL.


IMPACT

By exploiting this vulnerability, an attacker can use the server to perform arbitrary external service interactions. This could be especially used to interact with the nodes of an internal network, which are otherwise hidden to the outside by the network rules. An attacker can leverage this to footprint and reconnaissance a network, and in addition to that, if there are internal endpoints that do state changing operations upon GET requests, then it is possible to violate the integrity of them well. Depending on the level of protection enforced at endpoints, the impact of this vulnerability may vary.


SOLUTION

Upgrade the product version to 5.8.0 or higher which are not affected by this SSRF vulnerability. If you have any questions, post them to [email protected].

Note: If you are a WSO2 customer with Support Subscription, please use WSO2 Update Manager (WUM) updates in order to apply the fix to the affected versions.


CREDITS

WSO2 thanks, Abdulrahman Nour (redforce.io) for responsibly reporting the identified issue and working with us as we addressed them.

  • No labels