Learn about CVE-2023-35151 affecting XWiki Platform versions, allowing unauthorized access to obfuscated passwords via a REST endpoint. Discover mitigation steps and necessary updates.
A high severity vulnerability has been identified in XWiki Platform that may expose email addresses in clear in REST results, affecting certain versions of the platform.
Understanding CVE-2023-35151
In CVE-2023-35151, XWiki Platform versions prior to 14.4.8, 14.10.6, and 15.1 may allow any user to retrieve obfuscated passwords through a REST endpoint, even with mail obfuscation enabled.
What is CVE-2023-35151?
The CVE-2023-35151 vulnerability in XWiki Platform exposes private personal information, such as email addresses, to unauthorized users through a REST interface.
The Impact of CVE-2023-35151
The vulnerability poses a high risk as it allows attackers to access sensitive data, including obfuscated passwords, compromising the confidentiality of user information.
Technical Details of CVE-2023-35151
XWiki Platform, a generic wiki platform, is affected by CVE-2023-35151, allowing unauthorized retrieval of obfuscated passwords.
Vulnerability Description
Starting from version 7.3-milestone-1 to versions prior to 14.4.8, 14.10.6, and 15.1, any user can obtain obfuscated passwords through a REST endpoint.
Affected Systems and Versions
XWiki Platform versions affected include >= 7.3-milestone-1, < 14.4.8, >= 14.5, < 14.10.6, and >= 15.0-rc-1, < 15.1.
Exploitation Mechanism
The vulnerability allows unauthorized users to access obfuscated passwords via a REST endpoint, even with mail obfuscation enabled.
Mitigation and Prevention
To mitigate the risks associated with CVE-2023-35151, immediate actions and long-term security practices are recommended.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates