{"id":25486,"date":"2025-04-17T01:22:40","date_gmt":"2025-04-17T01:22:40","guid":{"rendered":""},"modified":"2025-06-13T17:21:48","modified_gmt":"2025-06-13T23:21:48","slug":"cve-2023-50343-hcl-dryice-myxalytics-improper-access-control-vulnerability","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2023-50343-hcl-dryice-myxalytics-improper-access-control-vulnerability\/","title":{"rendered":"<strong>CVE-2023-50343: HCL DRYiCE MyXalytics Improper Access Control Vulnerability<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>CVE-2023-50343 is a critical cybersecurity vulnerability found in HCL DRYiCE MyXalytics software. The issue stems from improper access control to certain API endpoints, which can allow unauthorized access to sensitive user information. This vulnerability primarily affects Customer Admin Users, granting them potential <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-2815-unauthorized-modification-of-data-in-administrator-z-wordpress-plugin\/\"  data-wpil-monitor-id=\"29894\">unauthorized access to other user data<\/a>. With the increasing reliance on software solutions for business operations, this vulnerability presents a significant risk for any enterprise using HCL DRYiCE MyXalytics software, potentially <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3328-buffer-overflow-vulnerability-in-tenda-ac1206-could-lead-to-system-compromise\/\"  data-wpil-monitor-id=\"29893\">leading to system<\/a> compromise or data leaks.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2023-50343<br \/>\nSeverity: High (8.3 CVSS Score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: Low (Customer Admin User)<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-58136-critical-vulnerability-in-yii-2-framework-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"31724\">Potential system<\/a> compromise and data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1862256239\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>HCL DRYiCE MyXalytics | All <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3248-critical-code-injection-vulnerability-in-langflow-versions-prior-to-1-3-0\/\"  data-wpil-monitor-id=\"30434\">versions prior<\/a> to the patch<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/fortinet-s-fortigate-vulnerability-ssl-vpn-symlink-exploit-puts-user-access-at-risk-post-patching\/\"  data-wpil-monitor-id=\"30057\">exploit takes advantage of improper access<\/a> control in HCL DRYiCE MyXalytics. Certain API endpoints that should be restricted to higher-privilege users are <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-28232-unauthenticated-access-to-admin-panel-in-jmbroadcast-jmb0150-firmware-v1-0\/\"  data-wpil-monitor-id=\"37637\">accessible to Customer Admin<\/a> Users. A malicious actor with these privileges can send specific requests to these API endpoints to retrieve sensitive information about other users or <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-33114-npu-memory-corruption-leading-to-potential-system-compromise-or-data-leakage\/\"  data-wpil-monitor-id=\"32355\">potentially modify user data<\/a>.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-3973250297\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here&#8217;s a conceptual example of how the vulnerability might be exploited. This example assumes the attacker has already authenticated as a Customer Admin <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32603-sql-injection-vulnerability-in-hk-wp-online-users-stats\/\"  data-wpil-monitor-id=\"32354\">User and is making a POST request to the vulnerable<\/a> API endpoint:<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/api\/v1\/users\/details HTTP\/1.1\nHost: myxalytics.example.com\nContent-Type: application\/json\nAuthorization: Bearer {Customer Admin User Token}\n{ &quot;user_id&quot;: &quot;target_user_id&quot; }<\/code><\/pre>\n<p>In this example, the attacker uses their Customer Admin <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-31524-privilege-escalation-vulnerability-in-notfound-wp-user-profiles\/\"  data-wpil-monitor-id=\"32376\">User privileges<\/a> to send a request for another user&#8217;s details. The server, failing to enforce proper <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-20936-escalation-of-privileges-through-improper-access-control-in-hdcp-trustlet\/\"  data-wpil-monitor-id=\"30652\">access control<\/a>, sends back sensitive information about the target user.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-45724-unauthenticated-file-upload-vulnerability-in-hcl-dryice-myxalytics\/\"  data-wpil-monitor-id=\"33986\">HCL has released a patch to fix this vulnerability<\/a>, and it is highly recommended that all users update their software to the patched version as soon as possible. As a temporary mitigation, users may deploy a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) to monitor and block suspicious requests to the affected <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3260-security-vulnerability-in-grafana-api-endpoints-leading-to-permission-bypass\/\"  data-wpil-monitor-id=\"57689\">API endpoints<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview CVE-2023-50343 is a critical cybersecurity vulnerability found in HCL DRYiCE MyXalytics software. The issue stems from improper access control to certain API endpoints, which can allow unauthorized access to sensitive user information. This vulnerability primarily affects Customer Admin Users, granting them potential unauthorized access to other user data. With the increasing reliance on software [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-25486","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/25486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=25486"}],"version-history":[{"count":10,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/25486\/revisions"}],"predecessor-version":[{"id":51490,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/25486\/revisions\/51490"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=25486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=25486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=25486"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=25486"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=25486"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=25486"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=25486"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=25486"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=25486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}