CVE-2023-50342
📋 TL;DR
HCL DRYiCE MyXalytics has an Insecure Direct Object Reference (IDOR) vulnerability that allows authenticated users to access other users' information due to improper access controls. This affects all users of the vulnerable software versions, potentially exposing sensitive user data.
💻 Affected Systems
- HCL DRYiCE MyXalytics
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could enumerate all user accounts, extract sensitive personal information, and potentially use this data for further attacks like credential theft or social engineering.
Likely Case
Unauthorized access to other users' profile information, contact details, or system metadata, leading to privacy violations and potential data leakage.
If Mitigated
With proper access controls and authentication checks, users would only be able to access their own authorized data, preventing unauthorized information disclosure.
🎯 Exploit Status
Requires authenticated access; exploitation involves manipulating object references to access unauthorized data
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Consult vendor advisory for specific patched versions
Vendor Advisory: https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
Restart Required: Yes
Instructions:
1. Review vendor advisory KB0109608
2. Download and apply the latest security patch from HCL
3. Restart affected services
4. Verify the fix prevents unauthorized data access
🔧 Temporary Workarounds
Access Control Enhancement
allImplement additional server-side authorization checks for all user data access requests
Network Segmentation
allRestrict access to MyXalytics to only authorized users and networks
🧯 If You Can't Patch
- Implement strict network access controls and monitor for unusual data access patterns
- Add additional application-level authorization checks and audit all user data access
🔍 How to Verify
Check if Vulnerable:
Test authenticated access to user objects with different IDs; if unauthorized data is returned, system is vulnerable
Check Version:
Check application version through admin interface or consult vendor documentation
Verify Fix Applied:
After patching, attempt the same IDOR tests; system should return access denied errors for unauthorized requests
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authorization attempts
- Unusual pattern of user data access requests
- Access to user IDs outside normal range
Network Indicators:
- Unusual API call patterns to user endpoints
- High volume of requests to user data endpoints
SIEM Query:
source="myxalytics" AND (event_type="data_access" AND user_id!=requesting_user)