First published: Wed May 11 2022(Updated: )
XML External Entity (XXE) vulnerability in the file based service provider creation feature of the Management Console in WSO2 API Manager 2.6.0, 3.0.0, 3.1.0, 3.2.0, and 4.0.0; and WSO2 IS as Key Manager 5.7.0, 5.9.0, and 5.10.0; and WSO2 Identity Server 5.7.0, 5.8.0, 5.9.0, 5.10.0, and 5.11.0. Allows attackers to gain read access to sensitive information or cause a denial of service via crafted GET requests.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WSO2 API Manager | =2.6.0 | |
WSO2 API Manager | =3.0.0 | |
WSO2 API Manager | =3.1.0 | |
WSO2 API Manager | =3.2.0 | |
WSO2 API Manager | =4.0.0 | |
WSO2 Identity Server | =5.7.0 | |
WSO2 Identity Server | =5.8.0 | |
WSO2 Identity Server | =5.9.0 | |
WSO2 Identity Server | =5.10.0 | |
WSO2 Identity Server | =5.11.0 | |
WSO2 Identity Server as Key Manager | =5.7.0 | |
WSO2 Identity Server as Key Manager | =5.9.0 | |
WSO2 Identity Server as Key Manager | =5.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-42646.
The severity level of CVE-2021-42646 is critical.
The affected software versions are WSO2 API Manager 2.6.0, 3.0.0, 3.1.0, 3.2.0, and 4.0.0; WSO2 IS as Key Manager 5.7.0, 5.9.0, and 5.10.0; and WSO2 Identity Server 5.7.0, 5.8.0, 5.9.0, 5.10.0, and 5.11.0.
To fix CVE-2021-42646, it is recommended to apply the latest security patches provided by WSO2 and follow their security advisory.
You can find more information about CVE-2021-42646 in the following references: [Reference 1](http://packetstormsecurity.com/files/167465/WSO2-Management-Console-XML-Injection.html), [Reference 2](http://seclists.org/fulldisclosure/2022/Jun/7), [Reference 3](https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2021-1289).