Multiple WSO2 products have been identified as vulnerable due to lack of server-side input validation in the Forum feature, API rating could be manipulated.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-3309 Multiple WSO2 products have been identified as vulnerable due to lack of server-side input validation in the Forum feature, API rating could be manipulated.
Github GHSA Github GHSA GHSA-w7rx-824v-rgx5 WSO2 API Manager allows attackers to change the API rating
Fixes

Solution

For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly. Community users may apply the relevant fixes to the product based on the public fix(s) advertised in  https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1357/


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: WSO2

Published:

Updated: 2024-08-02T08:42:07.483Z

Reserved: 2023-12-15T09:13:13.207Z

Link: CVE-2023-6835

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-15T10:15:09.043

Modified: 2024-11-21T08:44:38.680

Link: CVE-2023-6835

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.