Learn about CVE-2023-50719 affecting XWiki Platform, exposing user password hashes to unauthorized actors. Find out the impact, affected versions, and mitigation steps.
XWiki Platform Solr search vulnerability exposes password hashes of all users to unauthorized actors, impacting versions prior to 14.10.15, 15.5.2, and 15.7-rc-1.
Understanding CVE-2023-50719
This CVE-2023-50719 affects XWiki Platform, a generic wiki platform, compromising the security of user password hashes by revealing them to unauthorized individuals.
What is CVE-2023-50719?
XWiki Platform's Solr-based search from version 7.2-milestone-2 to versions before 14.10.15, 15.5.2, and 15.7-rc-1 exposes user password hashes to any user with view rights on the profiles. This vulnerability endangers any configuration data containing sensitive data like API keys, making it visible to attackers.
The Impact of CVE-2023-50719
This vulnerability enables attackers to view normally inaccessible passwords in plain text, posing a significant risk to user account security and sensitive information stored within the XWiki Platform.
Technical Details of CVE-2023-50719
The security flaw lies in XWiki Platform's Solr search functionality, allowing unauthorized access to private user information.
Vulnerability Description
The vulnerability in XWiki Platform exposes password hashes of all users to unauthorized actors, compromising the confidentiality and security of user accounts.
Affected Systems and Versions
= 7.2-milestone-2, < 14.10.15
= 15.0-rc-1, < 15.5.2
= 15.6-rc-1, < 15.7-rc-1
Exploitation Mechanism
The vulnerability allows individuals with view rights on user profiles to access password hashes, including configurations with sensitive data like API keys, leading to potential security breaches.
Mitigation and Prevention
Addressing and mitigating CVE-2023-50719 is crucial to safeguarding user data in XWiki Platform.
Immediate Steps to Take
Users and administrators should update XWiki Platform to the patched versions - 14.10.15, 15.5.2, or 15.7RC1. Avoid sharing sensitive information in public user profiles to minimize exposure to unauthorized actors.
Long-Term Security Practices
Implement strict access controls, utilize secure password management practices, and regularly update XWiki Platform to prevent similar vulnerabilities in the future.
Patching and Updates
Apply the latest patches provided by XWiki to ensure the security of user data and prevent unauthorized access to sensitive information within the platform.