CVE-2021-22522

7.1 HIGH

📋 TL;DR

CVE-2021-22522 is a reflected cross-site scripting (XSS) vulnerability in Micro Focus Verastream Host Integrator versions 7.8 Update 1 and earlier. It allows attackers to inject malicious scripts via web requests, potentially leading to disclosure of confidential data such as session cookies or credentials. This affects users of the vulnerable software, particularly those with internet-facing deployments.

💻 Affected Systems

Products:
  • Micro Focus Verastream Host Integrator
Versions: Version 7.8 Update 1 and earlier versions
Operating Systems: Windows, Linux, Other platforms supported by Verastream Host Integrator
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is present in the web interface components; configurations with internet access are at higher risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal sensitive data (e.g., admin credentials), hijack user sessions, or perform actions on behalf of users, leading to data breaches or system compromise.

🟠

Likely Case

Attackers may trick users into clicking malicious links, resulting in session theft or unauthorized access to confidential information stored in the application.

🟢

If Mitigated

With proper input validation and output encoding, the risk is minimized, but residual exposure may exist if other vulnerabilities are present.

🌐 Internet-Facing: HIGH, as reflected XSS can be easily exploited via phishing or malicious links targeting external users.
🏢 Internal Only: MEDIUM, as internal users could still be targeted via internal phishing, but network segmentation may reduce exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires user interaction (e.g., clicking a link), but exploitation is straightforward with basic web skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 7.8 Update 2 or later; refer to vendor advisory for specific patches.

Vendor Advisory: https://support.microfocus.com/kb/doc.php?id=7025169

Restart Required: Yes

Instructions:

1. Review the vendor advisory for patch details. 2. Download and apply the latest update from Micro Focus. 3. Restart the Verastream Host Integrator services to apply changes. 4. Verify the fix by testing for XSS vulnerabilities.

🔧 Temporary Workarounds

Implement Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to block malicious input and reduce exploit risk.

Configure WAF rules to filter script tags and malicious payloads; specific commands depend on WAF vendor.

Disable Unnecessary Web Interfaces

all

Restrict access to vulnerable web components or disable them if not required for operations.

Use firewall rules to block external access to Verastream web ports (e.g., TCP 80/443).

🧯 If You Can't Patch

  • Isolate the system on a segmented network to limit exposure to trusted users only.
  • Enforce strict input validation and output encoding in custom configurations to mitigate XSS risks.

🔍 How to Verify

Check if Vulnerable:

Test by injecting a simple XSS payload (e.g., <script>alert('test')</script>) into web parameters; if it executes, the system is vulnerable.

Check Version:

Check the Verastream Host Integrator version via the admin console or by running 'verastream --version' on the command line, if available.

Verify Fix Applied:

After patching, repeat the XSS test; successful blocking or sanitization indicates the fix is applied.

📡 Detection & Monitoring

Log Indicators:

  • Look for HTTP requests containing script tags or unusual parameters in web server logs (e.g., access logs).

Network Indicators:

  • Monitor for patterns of reflected XSS attacks, such as repeated requests with encoded payloads to vulnerable endpoints.

SIEM Query:

Example: 'source="web_logs" AND (url CONTAINS "<script>" OR url CONTAINS "javascript:")'

🔗 References

📤 Share & Export