Published: 5th March 2nd September 2021
CVSS Score: 7.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L)
This vulnerability has an impact only if the resource has a trailing slash (e.g. "/foo/"). If such is the case, this allows attackers to bypass the intended access restrictions of the scope protected resources. This could lead to confidentiality, integrity and availability impact to the back-end services, depending on the provided functionalities and the security controls in place.
If you are using an affected product version, it is highly recommended to migrate to the latest released version to the latest version of the affected WSO2 product is not mentioned under the affected product list, you may migrate to the latest version to receive security fixes. You Otherwise you may also apply the relevant fixes to the product based on the changes from the public fix: https://github.com/wso2/carbon-apimgt/pull/10038