CVE-2022-24819 Scanner

CVE-2022-24819 Scanner - Information Disclosure vulnerability in XWiki

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

2 weeks 23 hours

Scan only one

URL

Toolbox

-

XWiki is a powerful open-source wiki platform used by businesses and developers for managing and sharing knowledge. It is designed to provide collaborative tools for documentation, project tracking, and data organization. XWiki is popular in enterprise environments for its customization capabilities and wide range of extensions. The software is used across industries like technology, education, and government to create dynamic knowledge bases and wikis. Its modular architecture allows users to adapt the platform to suit various needs. With support for scripting and APIs, XWiki enables the development of custom features and integrations.

The vulnerability involves unauthorized access to sensitive user information through a publicly accessible URL in XWiki. This flaw allows an unauthenticated attacker to retrieve a list of users and their full names. The issue affects versions earlier than 12.10.11, 13.4.4, and 13.9-rc-1. Information disclosure of this type could be leveraged to identify valid user accounts, making the system more susceptible to attacks like brute force or phishing. This vulnerability primarily impacts the confidentiality of the data, making sensitive user information exposed to potential misuse.

The technical details of the vulnerability lie in an endpoint that provides user data without proper authentication checks. Specifically, endpoints such as `/bin/login/XWikiLogin?xpage=uorgsuggest&uorg=user` are exposed, allowing attackers to retrieve user details in JSON or XML formats. Matchers in this scanner identify key elements like "value," "label," and "icon" in the response, confirming the presence of the flaw. The vulnerability stems from insufficient restrictions on specific paths, enabling malicious actors to gather data intended for internal use.

If exploited, this vulnerability can lead to the exposure of user details, facilitating targeted attacks such as social engineering or account compromise. In environments with sensitive user information, the impact could extend to reputational damage and compliance violations. Organizations relying on XWiki for enterprise knowledge management could face serious consequences if attackers leverage this vulnerability to infiltrate other systems or access critical information.

REFERENCES

Get started to protecting your Free Full Security Scan