Overview
CVE-2023-50343 is a critical cybersecurity vulnerability found in HCL DRYiCE MyXalytics software. The issue stems from improper access control to certain API endpoints, which can allow unauthorized access to sensitive user information. This vulnerability primarily affects Customer Admin Users, granting them potential unauthorized access to other user data. With the increasing reliance on software solutions for business operations, this vulnerability presents a significant risk for any enterprise using HCL DRYiCE MyXalytics software, potentially leading to system compromise or data leaks.
Vulnerability Summary
CVE ID: CVE-2023-50343
Severity: High (8.3 CVSS Score)
Attack Vector: Network
Privileges Required: Low (Customer Admin User)
User Interaction: None
Impact: Potential system compromise and data leakage
Affected Products
No phone number, email, or personal info required.
Product | Affected Versions
HCL DRYiCE MyXalytics | All versions prior to the patch
How the Exploit Works
The exploit takes advantage of improper access control in HCL DRYiCE MyXalytics. Certain API endpoints that should be restricted to higher-privilege users are accessible to Customer Admin Users. A malicious actor with these privileges can send specific requests to these API endpoints to retrieve sensitive information about other users or potentially modify user data.
Conceptual Example Code
Here’s a conceptual example of how the vulnerability might be exploited. This example assumes the attacker has already authenticated as a Customer Admin User and is making a POST request to the vulnerable API endpoint:
POST /api/v1/users/details HTTP/1.1
Host: myxalytics.example.com
Content-Type: application/json
Authorization: Bearer {Customer Admin User Token}
{ "user_id": "target_user_id" }
In this example, the attacker uses their Customer Admin User privileges to send a request for another user’s details. The server, failing to enforce proper access control, sends back sensitive information about the target user.
Mitigation Guidance
HCL has released a patch to fix this vulnerability, and it is highly recommended that all users update their software to the patched version as soon as possible. As a temporary mitigation, users may deploy a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) to monitor and block suspicious requests to the affected API endpoints.