A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution.
By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Api_control_plane | Wso2 | 4.5.0 (including) | 4.5.0 (including) |
| Api_control_plane | Wso2 | 4.6.0 (including) | 4.6.0 (including) |
| Api_manager | Wso2 | 4.2.0 (including) | 4.2.0 (including) |
| Api_manager | Wso2 | 4.3.0 (including) | 4.3.0 (including) |
| Api_manager | Wso2 | 4.4.0 (including) | 4.4.0 (including) |
| Api_manager | Wso2 | 4.5.0 (including) | 4.5.0 (including) |
| Api_manager | Wso2 | 4.6.0 (including) | 4.6.0 (including) |
| Traffic_manager | Wso2 | 4.5.0 (including) | 4.5.0 (including) |
| Traffic_manager | Wso2 | 4.6.0 (including) | 4.6.0 (including) |
| Universal_gateway | Wso2 | 4.5.0 (including) | 4.5.0 (including) |
| Universal_gateway | Wso2 | 4.6.0 (including) | 4.6.0 (including) |