CVE-2023-26476

7.5 HIGH

📋 TL;DR

This vulnerability in XWiki Platform allows attackers to deduce password field contents through repeated calls to LiveTableResults and WikisLiveTableResultsMacros macros. It affects all XWiki installations running vulnerable versions, potentially exposing user credentials. The issue stems from information disclosure in these macros.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 3.2-m3 through 14.6, 13.4.0 through 13.4.3, 13.10.0 through 13.10.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All XWiki installations using vulnerable versions with the LiveTableResults or WikisLiveTableResultsMacros macros accessible are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could systematically deduce password values, leading to credential theft, account compromise, and potential privilege escalation across the XWiki instance.

🟠

Likely Case

Attackers with access to the vulnerable macros could extract password information over time, compromising user accounts and potentially accessing sensitive wiki content.

🟢

If Mitigated

With proper access controls limiting macro execution to trusted users only, the attack surface is reduced, though the vulnerability still exists in the code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to call the vulnerable macros, which typically requires some level of authentication, but the technique is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.7-rc-1, 13.4.4, 13.10.9 or higher

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5cf8-vrr8-8hjm

Restart Required: Yes

Instructions:

1. Upgrade to XWiki 14.7-rc-1 or higher, OR 13.4.4 or higher, OR 13.10.9 or higher. 2. Apply manual patch from commit 7f8825537c9523ccb5051abd78014d156f9791c8 if on version >= 3.2M3. 3. Restart XWiki service.

🔧 Temporary Workarounds

Restrict Macro Access

all

Limit access to LiveTableResults and WikisLiveTableResultsMacros macros to trusted administrators only

Configure XWiki rights to restrict macro execution to admin users only

🧯 If You Can't Patch

  • Implement strict access controls to limit who can execute LiveTableResults and WikisLiveTableResultsMacros macros
  • Monitor logs for repeated calls to these macros and investigate suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check XWiki version against affected ranges. Review if LiveTableResults or WikisLiveTableResultsMacros macros are accessible to non-admin users.

Check Version:

Check XWiki version in administration panel or via xwiki.cfg configuration file

Verify Fix Applied:

Verify XWiki version is 14.7-rc-1+, 13.4.4+, or 13.10.9+. Test that password field content cannot be deduced through repeated macro calls.

📡 Detection & Monitoring

Log Indicators:

  • Repeated calls to LiveTableResults or WikisLiveTableResultsMacros from same source
  • Unusual macro execution patterns

Network Indicators:

  • Multiple requests to macro endpoints in short timeframes

SIEM Query:

source="xwiki" AND (uri="*LiveTableResults*" OR uri="*WikisLiveTableResultsMacros*") | stats count by src_ip

🔗 References

📤 Share & Export