First published: Thu Feb 16 2017(Updated: )
XML external entity (XXE) vulnerability in the XACML flow feature in WSO2 Identity Server 5.1.0 before WSO2-CARBON-PATCH-4.4.0-0231 allows remote authenticated users with access to XACML features to read arbitrary files, cause a denial of service, conduct server-side request forgery (SSRF) attacks, or have unspecified other impact via a crafted XACML request to entitlement/eval-policy-submit.jsp. NOTE: this issue can be combined with CVE-2016-4311 to exploit the vulnerability without credentials.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
WSO2 Identity Server | =5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4312 is considered a critical vulnerability due to its potential for remote access and file reading capabilities.
To fix CVE-2016-4312, upgrade WSO2 Identity Server to version 5.1.0 with the WSO2-CARBON-PATCH-4.4.0-0231 or later.
CVE-2016-4312 can facilitate attacks such as reading arbitrary files, denial of service, and server-side request forgery (SSRF).
CVE-2016-4312 affects remote authenticated users with access to the XACML features in WSO2 Identity Server version 5.1.0.
CVE-2016-4312 specifically impacts the XML external entity (XXE) processing within the XACML flow feature.