Information Exposure Affecting org.xwiki.platform:xwiki-platform-search-solr-api package, versions [,14.10.15)[15.0-rc-1,15.5.2)[15.6-rc-1,15.7-rc-1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
3.81% (92nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGXWIKIPLATFORM-6129517
  • published17 Dec 2023
  • disclosed15 Dec 2023
  • credit@YnoofAssiri

Introduced: 15 Dec 2023

CVE-2023-50720  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade org.xwiki.platform:xwiki-platform-search-solr-api to version 14.10.15, 15.5.2, 15.7-rc-1 or higher.

Overview

org.xwiki.platform:xwiki-platform-search-solr-api is a Solr engine management: configuration, indexing, listeners, script service, etc. This module does not handle the search queries

Affected versions of this package are vulnerable to Information Exposure via the Solr-based search functionality. An attacker can obtain email addresses of users even when email obfuscation is enabled by performing a specific search query.

PoC

To demonstrate the vulnerability, search for ;objcontent:email*; using XWiki's regular search interface.

CVSS Scores

version 3.1