FKIE_CVE-2024-7097

Vulnerability from fkie_nvd - Published: 2025-05-30 15:15 - Updated: 2025-10-06 13:51
Summary
An incorrect authorization vulnerability exists in multiple WSO2 products due to a flaw in the SOAP admin service, which allows user account creation regardless of the self-registration configuration settings. This vulnerability enables malicious actors to create new user accounts without proper authorization. Exploitation of this flaw could allow an attacker to create multiple low-privileged user accounts, gaining unauthorized access to the system. Additionally, continuous exploitation could lead to system resource exhaustion through mass user creation.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wso2:api_manager:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "245D4EB1-F69D-4FAF-94DB-F4B3D3C20539",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:api_manager:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6819491F-C6C3-41C1-B27A-0D0B62224977",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:api_manager:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D57C8CF-084D-4142-9AF1-7C9F1261A3BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:api_manager:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FF14774-8935-4FC9-B5C8-9771B3D6EBFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:api_manager:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1344FB79-0796-445C-A8F3-C03E995925D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:api_manager:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31E32CD-497E-4EF5-B3FC-8718EE06EDAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:api_manager:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58251E8-606B-47C8-8E50-9F9FC8C179BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:api_manager:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E21D7ABF-C328-425D-B914-618C7628220B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:api_manager:4.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "51465410-6B7C-40FD-A1AB-A14F650A6AC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:api_manager:4.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "851470CC-22AB-43E4-9CC6-5E22D49B3572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:api_manager:4.3.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "9EBAB99E-6F0F-4CE9-A954-E8878826304C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2689AF3E-01AA-4B79-BA55-6BB3D81E16CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:5.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0375C318-ECD2-4657-A0D7-4A0708266FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:5.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E7D773-A7CE-4AB8-828B-C2E7DC2799AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEA63B98-D4B4-4FCD-A869-FE64BC21A1B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DA0050E-D5DD-45E5-9F61-DC1BB060EFF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:5.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "26542F95-73F3-4906-838E-A66F5DC9DFA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:5.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60781FE4-38A3-4FEA-9D8B-CADE4B535974",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:5.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B169832-A746-49A6-8E92-06624AA9B13A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:5.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "981D701D-E381-484A-9614-CD0EF0331071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:5.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4F126CA-A2F9-44F4-968B-DF71765869E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:5.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2153AECE-020A-4C01-B2A6-F9F5D98E7EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B81C488-69D0-4A5C-AEED-31869C1BF5CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CD2558-C60C-4296-8E96-D4D804C598F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8DF49C6-F2F6-4229-982E-0C0559265203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "104DBA04-538E-4CC5-9B6C-CFEDB40375AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F0F121-700C-4D30-BAFC-960DCC56F08B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E5761F7-C287-4EC4-A899-C54FB4E80A35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B184BFC-8E1A-4971-B6D2-C594742AB8CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA51AC1B-0BF6-44F6-B034-CAD4F623DD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:identity_server_as_key_manager:5.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB34405-A2F1-461A-B51B-E103BB3680A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:open_banking_am:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "94347800-04D2-48C4-ACF0-078A5ACBB063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:open_banking_iam:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7C241A3-8EA0-41E4-ABF3-21B9D8E7A5BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:open_banking_km:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C46039C-BEE5-4338-8004-B5D9A7DEACBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:open_banking_km:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E53783F4-60C7-4A92-8951-F8FD51170670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wso2:open_banking_km:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "535EFD44-F81C-43B2-B595-81429468637F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An incorrect authorization vulnerability exists in multiple WSO2 products due to a flaw in the SOAP admin service, which allows user account creation regardless of the self-registration configuration settings. This vulnerability enables malicious actors to create new user accounts without proper authorization.\n\nExploitation of this flaw could allow an attacker to create multiple low-privileged user accounts, gaining unauthorized access to the system. Additionally, continuous exploitation could lead to system resource exhaustion through mass user creation."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de autorizaci\u00f3n incorrecta en varios productos WSO2 debido a una falla en el servicio de administraci\u00f3n SOAP, que permite la creaci\u00f3n de cuentas de usuario independientemente de la configuraci\u00f3n de autorregistro. Esta vulnerabilidad permite a actores maliciosos crear nuevas cuentas de usuario sin la debida autorizaci\u00f3n. La explotaci\u00f3n de esta falla podr\u00eda permitir a un atacante crear m\u00faltiples cuentas de usuario con privilegios bajos, obteniendo as\u00ed acceso no autorizado al sistema. Adem\u00e1s, la explotaci\u00f3n continua podr\u00eda provocar el agotamiento de los recursos del sistema mediante la creaci\u00f3n masiva de usuarios."
    }
  ],
  "id": "CVE-2024-7097",
  "lastModified": "2025-10-06T13:51:05.690",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-05-30T15:15:40.227",
  "references": [
    {
      "source": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3574/"
    }
  ],
  "sourceIdentifier": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…