CVE-2019-20443 - Stored Cross-Site Scripting in WSO2
Vendor
Affected Product
CVE
Securin ID
Status
Date
WSO2
See Full List Below*
CVE-2019-20443
2019-CSW-01-1024
Fixed
January 2, 2020
Description
This vulnerability was discovered on the WSO2 Identity Server before 5.7.0. A stored cross-site script (XSS) vulnerability allows an attacker to inject malicious code into the application and stored in the server. An input variable vulnerable to stored XSS is ‘mediaType’ on the browser page.
*Affected Products: WSO2 API Manager, WSO2 API Manager Analytics, WSO2 Enterprise Integrator, WSO2 IS as Key Manager, WSO2 Identity Server, WSO2 Identity Server Analytics
Proof of Concept (POC):
The following vulnerability was tested on WSO2 Identity Server version 5.7.0 Product.
Issue 01: Stored Cross-Site Scripting.
Figure 01: Edit “Media Type” value in the “Metadata” section.
Figure 02: Save “Media Type” with XSS payload, “><img src=x onerror=prompt(1)>
Figure 03: Injected XSS payload gets stored to the application.
Figure 04: Injected XSS Payload gets stored and executed in the browser.
Figure 05: The stored XSS payload gets executed in four different places throughout the page whenever the user loads the page.
Impact
Through an XSS attack, the attacker can make the browser redirect to a malicious website. Unauthorized actions such as changing the UI of the web page, retrieving information from the browser are possible. But since all session-related sensitive cookies are set with httpOnly flat and protected, session hijacking or mounting a similar attack would not be possible.
Remediations
Download the following relevant patch based on your product version.