Privilege Escalation in Multiple WSO2 Products via SOAP Admin Service Due to Business Logic Flaw
Description
A privilege escalation vulnerability exists in multiple WSO2 products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions only when all of the following conditions are met: * SOAP admin services are accessible to the attacker. * The deployment includes an internally used attribute that is not part of the default WSO2 product configuration. * At least one custom role exists with non-default permissions. * The attacker has knowledge of the custom role and the internal attribute used in the deployment.
Exploiting this vulnerability allows malicious actors to assign higher privileges to self-registered users, bypassing intended access control mechanisms.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.wso2.am:am-parentMaven | >= 2.0.0, < 4.4.0 | 4.4.0 |
org.wso2.is:identity-server-parentMaven | >= 5.2.0, < 7.1.0 | 7.1.0 |
Affected products
2- Range: 2.2.0
- WSO2/WSO2 Open Banking IAMv5Range: 2.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-j63j-7r7r-5v4jghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-7096ghsaADVISORY
- security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3573/mitrevendor-advisory
- github.com/wso2/docs-security/blob/cfd53689909eef62fc5427e193e35e7df8ab1ef8/en/docs/security-announcements/security-advisories/2024/WSO2-2024-3573.mdghsaWEB
- security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3573ghsaWEB
News mentions
0No linked articles in our index yet.