Vulnerability Description
The XML parsers within multiple WSO2 products accept user-supplied XML data without properly configuring to prevent the resolution of external entities. This omission allows malicious actors to craft XML payloads that exploit the parser's behavior, leading to the inclusion of external resources. By leveraging this vulnerability, an attacker can read confidential files from the file system and access limited HTTP resources reachable by the product. Additionally, the vulnerability can be exploited to perform denial of service attacks by exhausting server resources through recursive entity expansion or fetching large external resources.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wso2 | Api Manager | >= 3.1.0, < 3.1.0.278 |
| Wso2 | Identity Server | >= 5.10.0, < 5.10.0.300 |
| Wso2 | Identity Server As Key Manager | >= 5.10.0, < 5.10.0.296 |
| Wso2 | Open Banking Am | >= 2.0.0, < 2.0.0.328 |
| Wso2 | Open Banking Iam | >= 2.0.0, < 2.0.0.348 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-2374?
CVE-2024-2374 is a vulnerability with a CVSS score of 7.5 (HIGH). The XML parsers within multiple WSO2 products accept user-supplied XML data without properly configuring to prevent the resolution of external entities. This omission allows malicious actors to craft ...
How severe is CVE-2024-2374?
CVE-2024-2374 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-2374?
Check the references section above for vendor advisories and patch information. Affected products include: Wso2 Api Manager, Wso2 Identity Server, Wso2 Identity Server As Key Manager, Wso2 Open Banking Am, Wso2 Open Banking Iam.