CVE-2020-14245

9.8 CRITICAL

📋 TL;DR

CVE-2020-14245 is an authentication bypass vulnerability in HCL OneTest UI that allows unauthenticated attackers to access functionality requiring user identity or consume significant resources. Affected versions include V9.5, V10.0, and V10.1. This vulnerability enables unauthorized access to sensitive features without valid credentials.

💻 Affected Systems

Products:
  • HCL OneTest UI
Versions: V9.5, V10.0, V10.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through unauthorized access to administrative functions, data exfiltration, or resource exhaustion leading to denial of service.

🟠

Likely Case

Unauthorized access to sensitive testing data, configuration manipulation, or resource consumption attacks affecting application performance.

🟢

If Mitigated

Limited impact if network segmentation and access controls prevent external access to vulnerable interfaces.

🌐 Internet-Facing: HIGH - Directly exploitable without authentication from internet-facing deployments.
🏢 Internal Only: HIGH - Even internal attackers or compromised systems can exploit this without credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically require minimal technical skill to exploit once the vulnerable endpoint is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fixes from vendor advisory KB0086622

Vendor Advisory: https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0086622

Restart Required: Yes

Instructions:

1. Review HCL advisory KB0086622. 2. Download and apply the recommended patches. 3. Restart affected services. 4. Verify authentication is required for all sensitive functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to HCL OneTest UI to trusted networks only

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_NETWORK" port protocol="tcp" port="PORT_NUMBER" accept'
netsh advfirewall firewall add rule name="Block OneTest UI" dir=in action=block protocol=TCP localport=PORT_NUMBER remoteip=any

Access Control Lists

linux

Implement IP-based access controls to limit who can reach the vulnerable interface

iptables -A INPUT -p tcp --dport PORT_NUMBER -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport PORT_NUMBER -j DROP

🧯 If You Can't Patch

  • Isolate the HCL OneTest UI system from untrusted networks using firewall rules
  • Implement network monitoring and alerting for unauthorized access attempts to the vulnerable interface

🔍 How to Verify

Check if Vulnerable:

Check if HCL OneTest UI version is 9.5, 10.0, or 10.1 and test if authentication is required for sensitive endpoints

Check Version:

Check application version in web interface or configuration files

Verify Fix Applied:

Verify the patch has been applied and test that authentication is now properly enforced on all endpoints

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to sensitive endpoints
  • Failed authentication attempts followed by successful access
  • Unusual resource consumption patterns

Network Indicators:

  • Direct access to OneTest UI endpoints without authentication headers
  • Unusual traffic patterns to testing interfaces

SIEM Query:

source="OneTest UI" AND (event_type="access" AND auth_status="none") OR (resource_usage > threshold)

🔗 References

📤 Share & Export