8.8
Advisory Published
Updated

CVE-2020-24703

First published: Thu Aug 27 2020(Updated: )

An issue was discovered in certain WSO2 products. A valid Carbon Management Console session cookie may be sent to an attacker-controlled server if the victim submits a crafted Try It request, aka Session Hijacking. This affects API Manager 2.2.0, API Manager Analytics 2.2.0, API Microgateway 2.2.0, Data Analytics Server 3.2.0, Enterprise Integrator through 6.6.0, IS as Key Manager 5.5.0, Identity Server 5.5.0 and 5.8.0, Identity Server Analytics 5.5.0, and IoT Server 3.3.0 and 3.3.1.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
=2.2.0
=2.2.0
=2.2.0
=3.2.0
<=6.6.0
=5.5.0
=5.8.0
=5.5.0
=5.5.0
=3.3.0
=3.3.1
WSO2 API Manager=2.2.0
Wso2 Api Manager Analytics=2.2.0
WSO2 API Microgateway=2.2.0
WSO2 Data Analytics Server=3.2.0
WSO2 Enterprise Integrator<=6.6.0
WSO2 Identity Server=5.5.0
WSO2 Identity Server=5.8.0
WSO2 Identity Server Analytics=5.5.0
WSO2 Identity Server as Key Manager=5.5.0
Wso2 Iot Server=3.3.0
Wso2 Iot Server=3.3.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this issue?

    The vulnerability ID for this issue is CVE-2020-24703.

  • Which WSO2 products are affected by this vulnerability?

    This vulnerability affects API Manager 2.2.0, API Manager Analytics 2.2.0, API Microgateway 2.2.0, Data Analytics Server 3.2.0, Enterprise Integrator up to 6.6.0, Identity Server 5.5.0 and 5.8.0, Identity Server Analytics 5.5.0, Identity Server as Key Manager 5.5.0, IoT Server 3.3.0 and 3.3.1.

  • What is the severity of CVE-2020-24703?

    The severity of CVE-2020-24703 is high with a CVSS score of 8.8.

  • What is the issue in this vulnerability?

    The issue in this vulnerability is that a valid Carbon Management Console session cookie may be sent to an attacker-controlled server if the victim submits a crafted Try It request, leading to session hijacking.

  • How can I fix CVE-2020-24703?

    To fix CVE-2020-24703, it is recommended to apply the necessary patches or updates provided by WSO2 and follow the recommendations mentioned in the security advisory.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203