Vulnerability Description
In accountrecoveryendpoint/recoverpassword.do in WSO2 Identity Server 5.7.0, it is possible to perform a DOM-Based XSS attack affecting the callback parameter modifying the URL that precedes the callback parameter. Once the username or password reset procedure is completed, the JavaScript code will be executed. (recoverpassword.do also has an open redirect issue for a similar reason.)
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wso2 | Api Manager | 3.0.0 |
| Wso2 | Identity Server | 5.7.0 |
| Wso2 | Identity Server As Key Manager | 5.3.0 |
| Wso2 | Iot Server | 3.3.1 |
Related Weaknesses (CWE)
References
- https://docs.wso2.com/display/Security/2021+AdvisoriesVendor Advisory
- https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2021-1314Vendor Advisory
- https://docs.wso2.com/display/Security/2021+AdvisoriesVendor Advisory
- https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2021-1314Vendor Advisory
FAQ
What is CVE-2021-36760?
CVE-2021-36760 is a vulnerability with a CVSS score of 6.1 (MEDIUM). In accountrecoveryendpoint/recoverpassword.do in WSO2 Identity Server 5.7.0, it is possible to perform a DOM-Based XSS attack affecting the callback parameter modifying the URL that precedes the callb...
How severe is CVE-2021-36760?
CVE-2021-36760 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-36760?
Check the references section above for vendor advisories and patch information. Affected products include: Wso2 Api Manager, Wso2 Identity Server, Wso2 Identity Server As Key Manager, Wso2 Iot Server.