Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Current »

Published: 5th March 2021

Version: 1.0.0

Severity: High

CVSS Score: 7.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L)


WSO2 API Manager : 3.1.0 or earlier
WSO2 IS as Key Manager : 5.9.0 , 5.10.0


Improper authorization check when accessing API resources.


API Gateway does not properly validate the token scope when accessing a resource with a trailing slash (e.g. "/foo/").


This vulnerability has an impact only if the resource has a trailing slash (e.g. "/foo/"). If such is the case, this allows attackers to bypass the intended access restrictions of the scope protected resources. This could lead to confidentiality, integrity and availability impact to the back-end services, depending on the provided functionalities and the security controls in place.


If you are using an affected product version, it is highly recommended to migrate to the latest released version to receive security fixes.

You may also apply the relevant fixes based on the changes from the public fix:

Note: If you are a WSO2 customer with Support Subscription, please use WSO2 Update Manager (WUM) updates in order to apply the fix.

  • No labels