||
Skip to end of metadata
Go to start of metadata

Published: 13th May 2020

Severity: High

CVSS Score: 8.7 (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N)


AFFECTED PRODUCTS

WSO2 API Manager : 3.0.0
WSO2 IS as Key Manager : 5.9.0


OVERVIEW

API Manager bypass JWT signature verification for cached API requests.


DESCRIPTION

A user can bypass the JWT signature verification and make a API request with any JWT claim value (with the previous signature), if the API is already invoked and the JWT signature is cached.


IMPACT

This vulnerability can lead to the exposure of API resources. Further, an attacker can do the unintended operations on API resources and harm.


SOLUTION

If you are using an affected product version, it is highly recommended to migrate to the latest released version to receive security fixes.

You may also apply the relevant fixes based on the changes from the public fix: https://github.com/wso2/carbon-apimgt/pull/8167

Note: If you are a WSO2 customer with Support Subscription, please use WSO2 Update Manager (WUM) updates in order to apply the fix.

  • No labels