In accountrecoveryendpoint/recoverpassword.do in WSO2 Identity Server 5.7.0, it is possible to perform a DOM-Based XSS attack affecting the callback parameter modifying the URL that precedes the callback parameter. Once the username or password reset procedure is completed, the JavaScript code will be executed. (recoverpassword.do also has an open redirect issue for a similar reason.)
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wso2 api manager 3.0.0 |
||
wso2 api manager 3.1.0 |
||
wso2 api manager 3.2.0 |
||
wso2 api manager 4.0.0 |
||
wso2 identity server 5.7.0 |
||
wso2 identity server 5.8.0 |
||
wso2 identity server 5.9.0 |
||
wso2 identity server 5.10.0 |
||
wso2 identity server 5.11.0 |
||
wso2 identity server as key manager 5.3.0 |
||
wso2 identity server as key manager 5.5.0 |
||
wso2 identity server as key manager 5.6.0 |
||
wso2 identity server as key manager 5.7.0 |
||
wso2 identity server as key manager 5.9.0 |
||
wso2 identity server as key manager 5.10.0 |
||
wso2 iot server 3.3.1 |