A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution.
By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.
| Software | From | Fixed in |
|---|---|---|
| wso2 / api_control_plane | 4.5.0 | 4.5.0.x |
| wso2 / api_control_plane | 4.6.0 | 4.6.0.x |
| wso2 / api_manager | 4.2.0 | 4.2.0.x |
| wso2 / api_manager | 4.3.0 | 4.3.0.x |
| wso2 / api_manager | 4.4.0 | 4.4.0.x |
| wso2 / api_manager | 4.5.0 | 4.5.0.x |
| wso2 / api_manager | 4.6.0 | 4.6.0.x |
| wso2 / traffic_manager | 4.5.0 | 4.5.0.x |
| wso2 / traffic_manager | 4.6.0 | 4.6.0.x |
| wso2 / universal_gateway | 4.5.0 | 4.5.0.x |
| wso2 / universal_gateway | 4.6.0 | 4.6.0.x |