Published: 13th May 2020
Severity: High
CVSS Score: 8.7 (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N)
AFFECTED PRODUCTS
WSO2 API Manager : 3.0.0
WSO2 IS as Key Manager : 5.9.0
OVERVIEW
API Manager bypass JWT signature verification for cached API requests.
DESCRIPTION
A user can bypass the JWT signature verification and make a API request with any JWT claim value (with the previous signature), if the API is already invoked and the JWT signature is cached.
IMPACT
This vulnerability can lead to the exposure of API resources. Further, an attacker can do the unintended operations on API resources and harm.
SOLUTION
If you are using an affected product version, it is highly recommended to migrate to the latest released version to receive security fixes.
You may also apply the relevant fixes based on the changes from the public fix: https://github.com/wso2/carbon-apimgt/pull/8167
Note: If you are a WSO2 customer with Support Subscription, please use WSO2 Update Manager (WUM) updates in order to apply the fix.