Skip to end of metadata
Go to start of metadata

Published: 08th September 2020

Version: 1.0.0

Severity: Medium

CVSS Score: 4.2 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)


WSO2 Enterprise Integrator : 6.6.0 or earlier


A potential Cross-Site Request Forgery vulnerability has been identified in the Management Console.


Adding a Message Store, loadBalanceEndpoint, templateEndpoint and recipientlistEndpoint by entering required details in the Management console is found to be vulnerable to a potential Cross-Site Request attacks.


By leveraging the CSRF vulnerability, an attacker may steal or manipulate customer session and cookies, which might be used to impersonate a legitimate user. It leads to allow the attacker to perform changes as a legitimate user.


If you are using an affected product version, it is highly recommended to migrate to the latest released version to receive security fixes.

You may also apply the relevant fixes based on the changes from the public fix: https://github.com/wso2/carbon-mediation/pull/1389

Note: If you are a WSO2 customer with Support Subscription, please use WSO2 Update Manager (WUM) updates in order to apply the fix.

  • No labels