CVE-2021-22528

8.0 HIGH

📋 TL;DR

This vulnerability allows attackers to execute malicious JavaScript in users' browsers through NetIQ Access Manager web interfaces. It affects organizations using NetIQ Access Manager versions before 5.0.1 and 4.5.4. Attackers can craft malicious URLs that, when visited by authenticated users, execute arbitrary scripts in the context of the Access Manager application.

💻 Affected Systems

Products:
  • NetIQ Access Manager
Versions: All versions prior to 5.0.1 and 4.5.4
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web administration interfaces and potentially user-facing portals. Requires user interaction (clicking malicious link).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or compromise administrator accounts leading to full system takeover.

🟠

Likely Case

Attackers steal user session tokens to impersonate legitimate users, potentially accessing sensitive applications protected by Access Manager.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before reaching user browsers, preventing execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Reflected XSS typically requires social engineering to trick users into clicking malicious links. No authentication bypass required once user is logged in.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0.1 or 4.5.4

Vendor Advisory: https://support.microfocus.com/kb/doc.php?id=7025259

Restart Required: Yes

Instructions:

1. Download and install NetIQ Access Manager 5.0.1 or 4.5.4 from Micro Focus support portal. 2. Apply the patch following vendor documentation. 3. Restart all Access Manager services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall rules or input validation to block malicious script patterns

WAF specific - configure rules to filter <script>, javascript:, and other XSS patterns

Content Security Policy

all

Implement strict CSP headers to restrict script execution sources

Add header: Content-Security-Policy: default-src 'self'

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers
  • Deploy web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Test web interfaces with XSS payloads like <script>alert('XSS')</script> in URL parameters

Check Version:

Check Access Manager version in administration console or via command: namadmin --version

Verify Fix Applied:

After patching, retest with XSS payloads to confirm they are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual long URLs with script tags in access logs
  • Multiple failed login attempts followed by suspicious redirects

Network Indicators:

  • HTTP requests containing <script> tags or javascript: URIs
  • Unusual outbound connections from user browsers

SIEM Query:

source="access_manager.logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export