CVE-2024-1440

5.4 MEDIUM

📋 TL;DR

An open redirection vulnerability in WSO2 products allows attackers to craft malicious authentication links that redirect users to attacker-controlled sites. This affects WSO2 products with multi-option authentication enabled, potentially enabling phishing attacks against users.

💻 Affected Systems

Products:
  • WSO2 Identity Server
  • WSO2 API Manager
  • WSO2 Enterprise Integrator
  • WSO2 Micro Integrator
  • WSO2 Streaming Integrator
  • WSO2 Micro Gateway
Versions: WSO2 Identity Server 6.1.0, WSO2 API Manager 4.2.0, WSO2 Enterprise Integrator 7.2.0, WSO2 Micro Integrator 4.2.0, WSO2 Streaming Integrator 2.2.0, WSO2 Micro Gateway 4.2.0
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when multi-option authentication is enabled in affected products.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users are redirected to sophisticated phishing sites that harvest credentials, session tokens, or install malware, leading to account compromise and data breaches.

🟠

Likely Case

Users are tricked into visiting phishing pages that attempt to steal login credentials or personal information.

🟢

If Mitigated

With proper user awareness training and browser security controls, users may recognize suspicious redirects, limiting successful attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting a malicious URL with a redirect parameter, which is straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply security updates: WSO2 Identity Server 6.1.0.1, WSO2 API Manager 4.2.0.1, WSO2 Enterprise Integrator 7.2.0.1, WSO2 Micro Integrator 4.2.0.1, WSO2 Streaming Integrator 2.2.0.1, WSO2 Micro Gateway 4.2.0.1

Vendor Advisory: https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3171/

Restart Required: Yes

Instructions:

1. Download the security update from WSO2's official repository. 2. Backup your current installation. 3. Apply the patch according to WSO2's update documentation. 4. Restart the affected services. 5. Verify the fix is applied.

🔧 Temporary Workarounds

Disable Multi-Option Authentication

all

Temporarily disable multi-option authentication feature until patching is complete.

Edit authentication.xml configuration file and set <MultiOptionAuthenticator> to disabled

Implement URL Validation Filter

all

Add a web application filter to validate and sanitize redirect URLs.

Configure web.xml with a custom filter that validates redirect parameters against allowed domains

🧯 If You Can't Patch

  • Implement strict input validation for all URL parameters in authentication endpoints
  • Deploy web application firewall (WAF) rules to detect and block open redirect attempts

🔍 How to Verify

Check if Vulnerable:

Check if multi-option authentication is enabled and test with crafted redirect URLs containing external domains.

Check Version:

Check product version via management console or review product documentation for version details

Verify Fix Applied:

After patching, test that redirect URLs are properly validated and external domains are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in authentication logs
  • Requests with suspicious redirect parameters

Network Indicators:

  • HTTP 302 redirects to external domains from authentication endpoints

SIEM Query:

source="wso2-auth.log" AND (url="*redirect=*" OR status=302) AND NOT dest_domain="*.yourdomain.com"

🔗 References

📤 Share & Export