CVE-2021-36760

EUVD-2021-23348
In accountrecoveryendpoint/recoverpassword.do in WSO2 Identity Server 5.7.0, it is possible to perform a DOM-Based XSS attack affecting the callback parameter modifying the URL that precedes the callback parameter. Once the username or password reset procedure is completed, the JavaScript code will be executed. (recoverpassword.do also has an open redirect issue for a similar reason.)
Cross-site Scripting
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 70%
Affected Products (NVD)
VendorProductVersion
wso2api_manager
3.0.0
wso2api_manager
3.1.0
wso2api_manager
3.2.0
wso2api_manager
4.0.0
wso2identity_server
5.7.0
wso2identity_server
5.8.0
wso2identity_server
5.9.0
wso2identity_server
5.10.0
wso2identity_server
5.11.0
wso2identity_server_as_key_manager
5.3.0
wso2identity_server_as_key_manager
5.5.0
wso2identity_server_as_key_manager
5.6.0
wso2identity_server_as_key_manager
5.7.0
wso2identity_server_as_key_manager
5.9.0
wso2identity_server_as_key_manager
5.10.0
wso2iot_server
3.3.1
𝑥
= Vulnerable software versions