||
Skip to end of metadata
Go to start of metadata

Published: 5th March 2021

Version: 1.0.0

Severity: High

CVSS Score: 7.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L)


AFFECTED PRODUCTS

WSO2 API Manager : 3.1.0 or earlier
WSO2 IS as Key Manager : 5.9.0 , 5.10.0


OVERVIEW

Improper authorization check when accessing API resources.


DESCRIPTION

API Gateway does not properly validate the token scope when accessing a resource with a trailing slash (e.g. "/foo/").


IMPACT

This vulnerability has an impact only if the resource has a trailing slash (e.g. "/foo/"). If such is the case, this allows attackers to bypass the intended access restrictions of the scope protected resources. This could lead to confidentiality, integrity and availability impact to the back-end services, depending on the provided functionalities and the security controls in place.


SOLUTION

If you are using an affected product version, it is highly recommended to migrate to the latest released version to receive security fixes.

You may also apply the relevant fixes based on the changes from the public fix: https://github.com/wso2/carbon-apimgt/pull/10038

Note: If you are a WSO2 customer with Support Subscription, please use WSO2 Update Manager (WUM) updates in order to apply the fix.

  • No labels