{"id":7857,"date":"2019-06-25T21:07:49","date_gmt":"2019-06-26T04:07:49","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=zerodays&p=7857"},"modified":"2023-02-14T18:29:11","modified_gmt":"2023-02-15T01:29:11","slug":"cve-2019-20436-wso2","status":"publish","type":"zerodays","link":"https:\/\/10.42.32.162\/zerodays\/cve-2019-20436-wso2\/","title":{"rendered":"CVE-2019-20436 – Stored Cross-Site Scripting in WSO2 Product"},"content":{"rendered":"

An issue was discovered in WSO2 API Manager 2.6.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. If there is a claim dialect configured with an XSS payload in the dialect URI, and a user picks up this dialect’s URI and adds it as the service provider claim dialect while configuring the service provider, that payload gets executed. The attacker also needs to have privileges to log in to the management console and to add and configure claim dialects.<\/p>\n

 <\/p>\n

*Affected Products:<\/strong> WSO2 API Manager, WSO2 API Manager Analytics, WSO2 IS as Key Manager, WSO2 Identity Server, WSO2 Identity Server Analytics<\/p>\n","protected":false},"featured_media":7843,"parent":0,"menu_order":0,"template":"","meta":{"content-type":""},"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays\/7857"}],"collection":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays"}],"about":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/types\/zerodays"}],"version-history":[{"count":5,"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays\/7857\/revisions"}],"predecessor-version":[{"id":14038,"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays\/7857\/revisions\/14038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/media\/7843"}],"wp:attachment":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/media?parent=7857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}