Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Published: 30th June 2020

Severity: Medium

CVSS Score: 5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)


AFFECTED PRODUCTS

WSO2 API Manager : 3.1.0 or earlier
WSO2 IS as Key Manager : 5.10.0 or earlier
WSO2 Identity Server : 5.10.0 or earlier


OVERVIEW

A potential User Enumeration vulnerability has been found in WSO2 products.


DESCRIPTION

This vulnerbility is reproducable only If the showAuthFailureReason parameter is set to true for the BasicAuthenticator. When the basic authenticator is used, if wrong user credentials are entered, an error code is sent in the response params which indicates that the user does not exist in the system.


IMPACT

By leveraging a User Enumeration attack, an attacker can identify valid users of the system and exploit further attacks.


SOLUTION

If you are using an affected product version, it is highly recommended to migrate to the latest released version to receive security fixes.

You may also apply the relevant fixes based on the changes from the public fix: https://github.com/wso2/carbon-identity-framework/pull/2918,https://github.com/wso2-extensions/identity-governance/pull/380,https://github.com/wso2-extensions/identity-event-handler-account-lock/pull/65

Note: If you are a WSO2 customer with Support Subscription, please use WSO2 Update Manager (WUM) updates in order to apply the fix.

  • No labels