CVE-2024-3511

4.3 MEDIUM

📋 TL;DR

This CVE describes an authorization bypass vulnerability in WSO2 products that allows authenticated users with management console access to retrieve versioned registry files without proper permissions. Attackers could access sensitive configuration or resource files stored as registry versions. Organizations using affected WSO2 products with versioned registry files are impacted.

💻 Affected Systems

Products:
  • WSO2 API Manager
  • WSO2 Identity Server
  • WSO2 Enterprise Integrator
  • WSO2 Micro Integrator
  • WSO2 Streaming Integrator
  • WSO2 Microgateway
Versions: WSO2 products from 4.0.0 up to and including 4.2.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to management console and versioned registry files to be present.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized disclosure of sensitive configuration files, credentials, or system information that could enable further attacks like privilege escalation or lateral movement.

🟠

Likely Case

Exposure of configuration files containing system details, API keys, or deployment information that aids reconnaissance for targeted attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, access controls, and monitoring are in place to detect unauthorized access attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the management console and knowledge of specific bypass method.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply security patch for WSO2-2024-2702 or upgrade to versions after 4.2.0

Vendor Advisory: https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-2702/

Restart Required: Yes

Instructions:

1. Download the security patch for WSO2-2024-2702 from WSO2 support. 2. Apply the patch according to WSO2 patch application procedures. 3. Restart the WSO2 server. 4. Verify the fix by testing authorization controls.

🔧 Temporary Workarounds

Restrict Management Console Access

all

Limit access to WSO2 management console to only authorized administrators using network controls and strong authentication.

Disable Versioning for Sensitive Registry Paths

all

Configure registry paths containing sensitive files to disable versioning where possible.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WSO2 management console from untrusted networks
  • Enhance monitoring and alerting for unauthorized access attempts to registry version endpoints

🔍 How to Verify

Check if Vulnerable:

Check if your WSO2 product version is between 4.0.0 and 4.2.0 inclusive, and test if authenticated users can access versioned registry files without proper authorization.

Check Version:

Check the WSO2_HOME/repository/conf/carbon.xml file or use the management console's 'About' section

Verify Fix Applied:

After applying patch, verify that authenticated users without proper permissions cannot access versioned registry files through the management console.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to registry version endpoints
  • Multiple failed authorization attempts followed by successful registry access

Network Indicators:

  • Unusual patterns of requests to registry version APIs from management console users

SIEM Query:

source="wso2-carbon.log" AND ("registry" AND "version" AND "access") AND NOT user="authorized_admin"

🔗 References

📤 Share & Export