Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ghsa-w2r3-453h-7v25
Vulnerability from github
Published
2025-06-23 21:31
Modified
2025-06-23 21:31
Severity ?
VLAI Severity ?
Details
An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization.
Successful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance.
{ "affected": [], "aliases": [ "CVE-2024-3511" ], "database_specific": { "cwe_ids": [ "CWE-863" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-06-23T09:15:21Z", "severity": "MODERATE" }, "details": "An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization.\n\nSuccessful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance.", "id": "GHSA-w2r3-453h-7v25", "modified": "2025-06-23T21:31:55Z", "published": "2025-06-23T21:31:55Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3511" }, { "type": "WEB", "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-2702" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ] }
CVE-2024-3511 (GCVE-0-2024-3511)
Vulnerability from cvelistv5
Published
2025-06-23 08:47
Modified
2025-06-23 12:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization.
Successful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WSO2 | WSO2 Enterprise Integrator |
Version: 6.6.0 < 6.6.0.205 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3511", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-23T12:38:22.864048Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-23T12:43:45.452Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WSO2 Enterprise Integrator", "vendor": "WSO2", "versions": [ { "lessThan": "6.6.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "6.6.0.205", "status": "affected", "version": "6.6.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 API Manager", "vendor": "WSO2", "versions": [ { "lessThan": "3.1.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "3.1.0.273", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "3.2.0.361", "status": "affected", "version": "3.2.0", "versionType": "custom" }, { "lessThan": "3.2.1.13", "status": "affected", "version": "3.2.1", "versionType": "custom" }, { "lessThan": "4.0.0.306", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "4.1.0.163", "status": "affected", "version": "4.1.0", "versionType": "custom" }, { "lessThan": "4.2.0.98", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.3.0.17", "status": "affected", "version": "4.3.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server as Key Manager", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.289", "status": "affected", "version": "5.10.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Identity Server", "vendor": "WSO2", "versions": [ { "lessThan": "5.10.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "5.10.0.292", "status": "affected", "version": "5.10.0", "versionType": "custom" }, { "lessThan": "5.11.0.333", "status": "affected", "version": "5.11.0", "versionType": "custom" }, { "lessThan": "6.0.0.180", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.1.0.141", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "7.0.0.8", "status": "affected", "version": "7.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking AM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.320", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "WSO2 Open Banking IAM", "vendor": "WSO2", "versions": [ { "lessThan": "2.0.0", "status": "unknown", "version": "0", "versionType": "custom" }, { "lessThan": "2.0.0.341", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "packageName": "org.wso2.carbon:org.wso2.carbon.user.core", "product": "WSO2 Carbon User Manager Kernel", "vendor": "WSO2", "versions": [ { "lessThan": "4.5.0.5", "status": "affected", "version": "4.5.0", "versionType": "custom" }, { "lessThan": "4.5.3.35", "status": "affected", "version": "4.5.3", "versionType": "custom" }, { "lessThan": "4.6.0.140", "status": "affected", "version": "4.6.0", "versionType": "custom" }, { "lessThan": "4.6.1.107", "status": "affected", "version": "4.6.1", "versionType": "custom" }, { "lessThan": "4.6.2.323", "status": "affected", "version": "4.6.2", "versionType": "custom" }, { "lessThan": "4.6.3.18", "status": "affected", "version": "4.6.3", "versionType": "custom" }, { "lessThan": "4.6.4.3", "status": "affected", "version": "4.6.4", "versionType": "custom" }, { "lessThan": "4.7.1.47", "status": "affected", "version": "4.7.1", "versionType": "custom" }, { "lessThan": "4.8.1.19", "status": "affected", "version": "4.8.1", "versionType": "custom" }, { "lessThan": "4.9.0.52", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "lessThan": "4.9.26.10", "status": "affected", "version": "4.9.26", "versionType": "custom" }, { "lessThan": "4.10.9.8", "status": "affected", "version": "4.10.9", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "4.10.13", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Viral Maniar - Security Researcher at Preemptive Cyber Security Pty Ltd" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization.\u003cbr\u003e\u003cbr\u003eSuccessful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance.\u003cbr\u003e" } ], "value": "An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization.\n\nSuccessful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-23T08:47:55.266Z", "orgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "shortName": "WSO2" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-2702/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eFollow the instructions given on \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-2702/#solution\"\u003e\u003cspan style=\"background-color: transparent;\"\u003ehttps://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-2702/#solution\u003c/span\u003e\u003c/a\u003e \u003cbr\u003e" } ], "value": "Follow the instructions given on https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-2702/#solution https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-2702/#solution" } ], "source": { "advisory": "WSO2-2024-2702", "discovery": "EXTERNAL" }, "title": "Incorrect Authorization in Multiple WSO2 Products Allows Unauthorized Access to Registry Versioned Files", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "assignerShortName": "WSO2", "cveId": "CVE-2024-3511", "datePublished": "2025-06-23T08:47:55.266Z", "dateReserved": "2024-04-09T12:08:02.707Z", "dateUpdated": "2025-06-23T12:43:45.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…