Certain WSO2 products allow unrestricted file upload with resultant remote code execution. The attacker must use a /fileupload endpoint with a Content-Disposition directory traversal sequence to reach a directory under the web root, such as a ../../../../repository/deployment/server/webapps directory. This affects WSO2 API Manager 2.2.0 and above through 4.0.0; WSO2 Identity Server 5.2.0 and above through 5.11.0; WSO2 Identity Server Analytics 5.4.0, 5.4.1, 5.5.0, and 5.6.0; WSO2 Identity Server as Key Manager 5.3.0 and above through 5.10.0; and WSO2 Enterprise Integrator 6.2.0 and above through 6.6.0.
References
Link | Resource |
---|---|
https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2021-1738 | Mitigation Vendor Advisory |
http://www.openwall.com/lists/oss-security/2022/04/22/7 | Mailing List Third Party Advisory |
https://github.com/hakivvi/CVE-2022-29464 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/166921/WSO-Arbitrary-File-Upload-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-04-18 15:15
Updated : 2022-09-09 09:54
NVD link : CVE-2022-29464
Mitre link : CVE-2022-29464
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
wso2
- api_manager
- identity_server_as_key_manager
- identity_server
- enterprise_integrator
- identity_server_analytics