Description
Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information.
Published: 2023-12-15
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly. Community users may apply the relevant fixes to the product based on the public fix(s) advertised in https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/ https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-0716/

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-3188 Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information.
Github GHSA Github GHSA GHSA-cr8h-fr86-8vfv WSO2 products vulnerable to XML External Entity attack
History

No history.

Subscriptions

Wso2 Api Manager Api Manager Analytics Api Microgateway Enterprise Integrator Identity Server Identity Server As Key Manager Micro Integrator
cve-icon MITRE

Status: PUBLISHED

Assigner: WSO2

Published:

Updated: 2024-08-02T08:42:08.180Z

Reserved: 2023-12-15T09:25:13.205Z

Link: CVE-2023-6836

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-15T10:15:09.407

Modified: 2024-11-21T08:44:38.827

Link: CVE-2023-6836

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses