CVE-2024-7487

5.8 MEDIUM

📋 TL;DR

This vulnerability allows attackers to bypass app-native authentication in WSO2 Identity Server 7.0.0 by passing invalid objects. Organizations using WSO2 Identity Server 7.0.0 for identity and access management are affected, potentially allowing unauthorized access to protected resources.

💻 Affected Systems

Products:
  • WSO2 Identity Server
Versions: 7.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects app-native authentication feature; other authentication methods may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of authentication system allowing unauthorized access to all protected applications and data.

🟠

Likely Case

Unauthorized access to specific applications using app-native authentication, potentially leading to data breaches or privilege escalation.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, but authentication bypass still possible.

🌐 Internet-Facing: HIGH - Authentication bypass vulnerabilities on internet-facing identity servers are critical attack vectors.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this to bypass authentication controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted requests to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.0.0.1 or later

Vendor Advisory: https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3348/

Restart Required: Yes

Instructions:

1. Download the patch from WSO2 support portal. 2. Backup current installation. 3. Apply patch according to WSO2 documentation. 4. Restart the Identity Server. 5. Verify patch application.

🔧 Temporary Workarounds

Disable app-native authentication

all

Temporarily disable the vulnerable authentication method until patching is complete.

Modify identity.xml to disable app-native authentication features

Network access restrictions

all

Restrict access to vulnerable endpoints using firewall rules or WAF.

Configure firewall to restrict access to /oauth2/token and related endpoints

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WSO2 Identity Server from critical systems
  • Enable detailed logging and monitoring for authentication bypass attempts

🔍 How to Verify

Check if Vulnerable:

Check if running WSO2 Identity Server version 7.0.0 and app-native authentication is enabled.

Check Version:

Check wso2server.sh startup logs or product-version file in installation directory

Verify Fix Applied:

Verify version is 7.0.0.1 or later and test app-native authentication with invalid objects.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts with unusual object parameters
  • Successful authentications with malformed requests

Network Indicators:

  • HTTP requests to /oauth2/token with unusual parameters
  • Authentication bypass patterns in traffic

SIEM Query:

source="wso2-identity-server" AND (message="authentication bypass" OR message="invalid object" OR status="200" AND auth_method="app-native")

🔗 References

📤 Share & Export