First published: Wed Oct 21 2020(Updated: )
WSO2 API Manager 3.1.0 and earlier has reflected XSS on the "publisher" component's admin interface. More precisely, it is possible to inject an XSS payload into the owner POST parameter, which does not filter user inputs. By putting an XSS payload in place of a valid Owner Name, a modal box appears that writes an error message concatenated to the injected payload (without any form of data encoding). This can also be exploited via CSRF.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WSO2 API Manager | <=3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of WSO2 API Manager is CVE-2020-17454.
The severity level of CVE-2020-17454 is medium, with a score of 6.1.
The reflected XSS vulnerability in WSO2 API Manager can be exploited by injecting an XSS payload into the owner POST parameter which does not filter user inputs.
WSO2 API Manager version 3.1.0 and earlier are affected by this vulnerability.
Yes, there is a security advisory available for CVE-2020-17454 at the following link: [Security Advisory WSO2-2020-0843](https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0843).