Description
Multiple WSO2 products have been identified as vulnerable due to lack of server-side input validation in the Forum feature, API rating could be manipulated.
Published: 2023-12-15
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly. Community users may apply the relevant fixes to the product based on the public fix(s) advertised in  https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2021-1357/

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-3309 Multiple WSO2 products have been identified as vulnerable due to lack of server-side input validation in the Forum feature, API rating could be manipulated.
Github GHSA Github GHSA GHSA-w7rx-824v-rgx5 WSO2 API Manager allows attackers to change the API rating
History

No history.

Subscriptions

Wso2 Api Manager Iot Server
cve-icon MITRE

Status: PUBLISHED

Assigner: WSO2

Published:

Updated: 2024-08-02T08:42:07.483Z

Reserved: 2023-12-15T09:13:13.207Z

Link: CVE-2023-6835

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-15T10:15:09.043

Modified: 2024-11-21T08:44:38.680

Link: CVE-2023-6835

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses