Data leak of password hash through xwiki change request
CVE-2023-49280
Summary
The XWiki Change Request application exposes a vulnerability that allows unauthorized users to edit pages and download sensitive XML files containing password hashes. By default, the Change Request feature permits users to edit any page, enabling a potential attacker to manipulate user profiles. After making unauthorized edits, attackers can download an XML file that may contain sensitive information, including password hashes, for any document a user is permitted to view. This vulnerability affects all versions of the Change Request application, necessitating immediate action from administrators to restrict editing rights for any pages containing password fields. The recently provided patch in Change Request 1.10 can help mitigate the risk, but administrators must also manually address existing change requests. A workaround exists by manually revoking Change Request rights in certain spaces, particularly in user profile areas.
Affected Version(s)
application-changerequest >= 0.1, < 1.10
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved