6.5

CVE-2024-7073

A server-side request forgery (SSRF) vulnerability exists in multiple WSO2 products due to improper input validation in SOAP admin services. This flaw allows unauthenticated attackers to manipulate server-side requests, enabling access to internal and external resources available through the network or filesystem.

Exploitation of this vulnerability could lead to unauthorized access to sensitive data and systems, including resources within private networks, as long as they are reachable by the affected product.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Data is provided by the National Vulnerability Database (NVD)
Wso2Identity Server Version5.2.0
Wso2Identity Server Version5.3.0
Wso2Identity Server Version5.4.0
Wso2Identity Server Version5.4.1
Wso2Identity Server Version5.5.0
Wso2Identity Server Version5.6.0
Wso2Identity Server Version5.7.0
Wso2Identity Server Version5.8.0
Wso2Identity Server Version5.9.0
Wso2Identity Server Version5.10.0
Wso2Identity Server Version5.11.0
Wso2Identity Server Version6.0.0
Wso2Identity Server Version6.1.0
Wso2Identity Server Version7.0.0
Wso2Open Banking Iam Version2.0.0
Wso2Open Banking Km Version1.3.0
Wso2Open Banking Km Version1.4.0
Wso2Open Banking Km Version1.5.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.08% 0.252
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
ed10eef1-636d-4fbe-9993-6890dfa878f8 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-918 Server-Side Request Forgery (SSRF)

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.