DETECTION OVERVIEW
Risk Factors
This vulnerability is well known and requires network access to a WSO2 server. An unauthenticated attacker can leverage public exploit code to gain complete control of a device or escalate privileges to spread malware across the network.
Kill Chain

WSO2 provides an enterprise platform for integrating application programming interfaces, applications, and web services. Some WSO2 products have a path traversal vulnerability that allows an unauthenticated attacker to upload a file to a restricted location. To exploit this vulnerability, the attacker sends a specifically-designed HTTP POST request that targets the /fileupload endpoint and includes form data that includes a malicious file, such as webshell, and a restricted file path with path traversal fragments, such as ../ or %252E%252E%252F. After the file is uploaded, the attacker can run commands by making additional requests to the web shell on the WSO2 server.
Apply relevant patches to affected versions
