QID 730454

Date Published: 2022-04-22

QID 730454: WSO2 API Manager Unrestricted Arbitrary File Upload and Remote Code Execution (RCE) Vulnerability (WSO2-2021-1738)

WSO2 API Manager is a complete solution for designing and publishing APIs, creating and managing a developer community, and for scalably routing API traffic. It leverages proven, production-ready integration, security, and governance components from the WSO2 Enterprise Service Bus, WSO2 Identity Server, and WSO2 Governance Registry. In addition, it leverages the WSO2 Data Analytics Server for analytics, giving you instant insight into APIs behavior.

Due to improper validation of user input, a malicious actor could upload an arbitrary file to a user controlled location of the server. By leveraging the arbitrary file upload vulnerability, it is further possible to gain remote code execution on the server.

Affected Products:
WSO2 API Manager 2.2.0 and above

QID Detection Logic (Unauthenticated):
This QID checks for vulnerable version of WSO2 API Manager by sending a GET request to /services/Version endpoint.

By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Vendor has released patch, for more information please refer to WSO2-2021-1738
    Vendor References

    CVEs related to QID 730454

    Software Advisories
    Advisory ID Software Component Link
    WSO2-2021-1738 URL Logo docs.wso2.com/pages/viewpage.action?pageId=180952746