Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-24703 : Security Advisory and Response

Learn about CVE-2020-24703, a vulnerability in WSO2 products allowing session hijacking. Find out affected systems, exploitation details, and mitigation steps.

An issue was discovered in certain WSO2 products where a valid Carbon Management Console session cookie may be sent to an attacker-controlled server if the victim submits a crafted Try It request, known as Session Hijacking.

Understanding CVE-2020-24703

This CVE affects various WSO2 products and poses a risk of session hijacking.

What is CVE-2020-24703?

CVE-2020-24703 refers to a vulnerability in certain WSO2 products that allows an attacker to potentially hijack a user's session by manipulating a crafted Try It request.

The Impact of CVE-2020-24703

The vulnerability can lead to the exposure of a valid session cookie to an attacker-controlled server, compromising user sessions and potentially leading to unauthorized access.

Technical Details of CVE-2020-24703

This section provides technical details of the vulnerability.

Vulnerability Description

The vulnerability allows for the interception of a valid Carbon Management Console session cookie by an attacker through a crafted Try It request.

Affected Systems and Versions

        API Manager 2.2.0
        API Manager Analytics 2.2.0
        API Microgateway 2.2.0
        Data Analytics Server 3.2.0
        Enterprise Integrator through 6.6.0
        IS as Key Manager 5.5.0
        Identity Server 5.5.0 and 5.8.0
        Identity Server Analytics 5.5.0
        IoT Server 3.3.0 and 3.3.1

Exploitation Mechanism

The vulnerability can be exploited by submitting a specially crafted Try It request to the affected WSO2 products, leading to the leakage of session cookies.

Mitigation and Prevention

Protecting systems from CVE-2020-24703 is crucial to prevent session hijacking and unauthorized access.

Immediate Steps to Take

        Apply patches or updates provided by WSO2 to address the vulnerability.
        Monitor network traffic for any suspicious activity that may indicate session hijacking attempts.
        Educate users on safe browsing practices to minimize the risk of falling victim to such attacks.

Long-Term Security Practices

        Implement strong session management practices to reduce the impact of session hijacking vulnerabilities.
        Regularly conduct security assessments and penetration testing to identify and address potential security gaps.

Patching and Updates

        Stay informed about security advisories and updates released by WSO2 to patch vulnerabilities promptly and enhance system security.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now