Miggo Logo

CVE-2023-34467: XWiki Platform may retrieve email addresses of all users

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.78306%
Published
6/20/2023
Updated
11/12/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.xwiki.platform:xwiki-platform-livetable-uimaven>= 3.5-milestone-1, < 14.4.814.4.8
org.xwiki.platform:xwiki-platform-livetable-uimaven>= 14.5, < 14.10.414.10.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key issues in LiveTableResultsMacros.xml: 1) The column inclusion logic (around line 79) originally only excluded Password fields, leaving Email fields exposed in query results. 2) The field value rendering (around line 493) lacked email obfuscation checks. The patch adds checks for email type and obfuscation configuration in both locations, confirming these were the vulnerable code paths. The CWE-402/668 mapping aligns with resource exposure through improper query construction and response handling.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** m*il o**us**tion *on*i*ur*tion w*s not *ully t*k*n into ***ount *n* w*il* t** m*il *ispl*y** to t** *n* us*r w*s o**us**t**: - t** r*st r*spons* w*s *lso *ont*inin* t** m*il uno**us**t** - us*r w*r* **l* to *ilt*r *n* sort on t** uno**

Reasoning

T** vuln*r**ility st*ms *rom two k*y issu*s in `Liv*T**l*R*sultsM**ros.xml`: *) T** *olumn in*lusion lo*i* (*roun* lin* **) ori*in*lly only *x*lu*** P*sswor* *i*l*s, l**vin* *m*il *i*l*s *xpos** in qu*ry r*sults. *) T** *i*l* v*lu* r*n**rin* (*roun*