Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Current »

Published: 04th April 2020

Severity: Low

CVSS Score: 2.6 (CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N) 


AFFECTED PRODUCTS

WSO2 API Manager Analytics : 2.6.0 , 3.0.0
WSO2 Enterprise Integrator : 6.4.0 , 6.5.0
WSO2 Identity Server Analytics : 5.7.0 , 5.8.0
WSO2 Micro Integrator Monitoring Dashboard : 1.1.1
WSO2 Stream Processor : 4.3.0 , 4.4.0


OVERVIEW

Potential Cross-Site Scripting (XSS) vulnerability have been identified in Analytics business-rules and dashboard.


DESCRIPTION

XSS vulnerability is detected in node business-rules and dashboard of Analytics. When XSS payload is used as a URL path, path is not getting encoded.


IMPACT

This attack is possible in certain older versions of web browsers that does not encode certain characters in URL which leads to Cross-Site Scripting (XSS) attack. This is not exploitable in any modern browser since all modern browsers will encode < and > signs in URLs


SOLUTION

If you are using an affected product version, it is highly recommended to migrate to the latest released version to receive security fixes.

You may also apply the relevant fixes based on the changes from the public fix: https://github.com/wso2/msf4j/pull/571

Note: If you are a WSO2 customer with Support Subscription, please use WSO2 Update Manager (WUM) updates in order to apply the fix.

  • No labels