CVE-2023-34465

9.9 CRITICAL

📋 TL;DR

This vulnerability allows any logged-in user in XWiki Platform to modify mail configuration settings, including viewing and editing SMTP credentials. Attackers can exploit this to steal email credentials, send spam/phishing emails, or disrupt email services. Affects XWiki versions 11.8-rc-1 through 14.4.7, 14.10.5, and 15.0.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 11.8-rc-1 through 14.4.7, 14.10.5, and 15.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with mail configuration enabled. Default configuration allows any logged-in user to edit Mail.MailConfig page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain SMTP credentials, send malicious emails from your domain, steal sensitive data via email interception, and potentially pivot to other systems using stolen credentials.

🟠

Likely Case

Unauthorized users modify mail settings, send spam/phishing emails from your organization's domain, and potentially exfiltrate email credentials.

🟢

If Mitigated

Limited to logged-in users only, with no access to SMTP credentials if proper access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a valid user account but is trivial once authenticated. No public exploit code available but simple to craft.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.4.8, 14.10.6, or 15.1

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g75c-cjr6-39mc

Restart Required: Yes

Instructions:

1. Backup your XWiki installation. 2. Upgrade to XWiki 14.4.8, 14.10.6, or 15.1. 3. Restart the XWiki service. 4. Verify the Mail.MailConfig page now has proper access controls.

🔧 Temporary Workarounds

Manual Access Control Update

all

Update permissions on Mail.MailConfig page to restrict access to trusted users only

Navigate to Mail.MailConfig page in XWiki
Edit page rights to restrict to XWiki.XWikiAdminGroup or specific trusted users

🧯 If You Can't Patch

  • Immediately restrict access to Mail.MailConfig page to only trusted administrators
  • Disable or monitor all non-admin user accounts for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check XWiki version. If between 11.8-rc-1 and 14.4.7/14.10.5/15.0, and Mail.MailConfig page is accessible to non-admin users, you are vulnerable.

Check Version:

Check XWiki version in administration panel or via xwiki.cfg configuration file

Verify Fix Applied:

After patching, verify that non-admin users cannot access or edit the Mail.MailConfig page.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Mail.MailConfig page
  • Changes to mail configuration by non-admin users
  • Unusual SMTP activity from XWiki server

Network Indicators:

  • Unexpected outbound SMTP traffic from XWiki server
  • Spam/phishing emails originating from your domain

SIEM Query:

source="xwiki" AND (event="page_edit" AND page="Mail.MailConfig" AND user!="admin") OR (event="mail_send" AND status="success" AND user!="admin")

🔗 References

📤 Share & Export