||
Skip to end of metadata
Go to start of metadata

Published: 08th September 2020

Version: 1.0.0

Severity: Medium

CVSS Score: 4.2 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)


AFFECTED PRODUCTS

WSO2 Enterprise Integrator : 6.6.0 or earlier


OVERVIEW

A potential Cross-Site Request Forgery vulnerability has been identified in the Management Console.


DESCRIPTION

Adding a Message Store, loadBalanceEndpoint, templateEndpoint and recipientlistEndpoint by entering required details in the Management console is found to be vulnerable to a potential Cross-Site Request attacks.


IMPACT

By leveraging the CSRF vulnerability, an attacker may steal or manipulate customer session and cookies, which might be used to impersonate a legitimate user. It leads to allow the attacker to perform changes as a legitimate user.


SOLUTION

If you are using an affected product version, it is highly recommended to migrate to the latest released version to receive security fixes.

You may also apply the relevant fixes based on the changes from the public fix: https://github.com/wso2/carbon-mediation/pull/1389

Note: If you are a WSO2 customer with Support Subscription, please use WSO2 Update Manager (WUM) updates in order to apply the fix.

  • No labels