Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-3289 Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console.
Github GHSA Github GHSA GHSA-rfq3-wpjh-ppvg WSO2 Registry Stored Cross Site Scripting (XSS) vulnerability
Fixes

Solution

For WSO2 Subscription holders, the recommended solution is to apply the provided patch/update to the affected versions of the products. If there are any instructions given with the patch/update, please make sure those are followed properly. Community users may apply the relevant fixes to the product based on the public fix(s) advertised inĀ  https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1... https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1225/


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: WSO2

Published:

Updated: 2024-08-02T08:42:08.416Z

Reserved: 2023-12-18T08:23:45.214Z

Link: CVE-2023-6911

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-18T09:15:05.810

Modified: 2024-11-21T08:44:49.210

Link: CVE-2023-6911

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.