CVE-2023-50342

7.1 HIGH

📋 TL;DR

HCL DRYiCE MyXalytics has an Insecure Direct Object Reference (IDOR) vulnerability that allows authenticated users to access other users' information due to improper access controls. This affects all users of the vulnerable software versions, potentially exposing sensitive user data.

💻 Affected Systems

Products:
  • HCL DRYiCE MyXalytics
Versions: Specific versions not detailed in provided references; consult vendor advisory for exact affected versions
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with vulnerable versions; requires authenticated user access

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enumerate all user accounts, extract sensitive personal information, and potentially use this data for further attacks like credential theft or social engineering.

🟠

Likely Case

Unauthorized access to other users' profile information, contact details, or system metadata, leading to privacy violations and potential data leakage.

🟢

If Mitigated

With proper access controls and authentication checks, users would only be able to access their own authorized data, preventing unauthorized information disclosure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access; exploitation involves manipulating object references to access unauthorized data

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Consult vendor advisory for specific patched versions

Vendor Advisory: https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608

Restart Required: Yes

Instructions:

1. Review vendor advisory KB0109608
2. Download and apply the latest security patch from HCL
3. Restart affected services
4. Verify the fix prevents unauthorized data access

🔧 Temporary Workarounds

Access Control Enhancement

all

Implement additional server-side authorization checks for all user data access requests

Network Segmentation

all

Restrict access to MyXalytics to only authorized users and networks

🧯 If You Can't Patch

  • Implement strict network access controls and monitor for unusual data access patterns
  • Add additional application-level authorization checks and audit all user data access

🔍 How to Verify

Check if Vulnerable:

Test authenticated access to user objects with different IDs; if unauthorized data is returned, system is vulnerable

Check Version:

Check application version through admin interface or consult vendor documentation

Verify Fix Applied:

After patching, attempt the same IDOR tests; system should return access denied errors for unauthorized requests

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts
  • Unusual pattern of user data access requests
  • Access to user IDs outside normal range

Network Indicators:

  • Unusual API call patterns to user endpoints
  • High volume of requests to user data endpoints

SIEM Query:

source="myxalytics" AND (event_type="data_access" AND user_id!=requesting_user)

🔗 References

📤 Share & Export