Multiple WSO2 products have been identified as vulnerable to perform user impersonatoin using JIT provisioning. In order for this vulnerability to have any impact on your deployment, following conditions must be met:
Attacker should have:
When all preconditions are met, a malicious actor could use JIT provisioning flow to perform user impersonation.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Api_manager | Wso2 | 2.5.0 (including) | 2.5.0 (including) |
Api_manager | Wso2 | 2.6.0 (including) | 2.6.0 (including) |
Api_manager | Wso2 | 3.0.0 (including) | 3.0.0 (including) |
Api_manager | Wso2 | 3.1.0 (including) | 3.1.0 (including) |
Api_manager | Wso2 | 3.2.0 (including) | 3.2.0 (including) |
Api_manager | Wso2 | 4.0.0 (including) | 4.0.0 (including) |