CVE-2023-50719
December 15, 2023
XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren't accessible but this vulnerability would disclose them as plain text. This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability.
Affected Packages
org.xwiki.platform:xwiki-platform-search-solr-api (JAVA):
Affected version(s) >=15.0-rc-1 <15.5.2Fix Suggestion:
Update to version 15.5.2org.xwiki.platform:xwiki-platform-search-solr-api (JAVA):
Affected version(s) >=7.2-milestone-2 <14.10.15Fix Suggestion:
Update to version 14.10.15org.xwiki.platform:xwiki-platform-search-solr-api (JAVA):
Affected version(s) >=15.6-rc-1 <15.7-rc-1Fix Suggestion:
Update to version 15.7-rc-1Related ResourcesĀ (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.7
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
EPSS
Base Score:
51.13