CVE-2021-27777

7.5 HIGH
XXE

📋 TL;DR

CVE-2021-27777 is an XML External Entity (XXE) injection vulnerability in HCL Domino that allows attackers to read arbitrary files from the server filesystem. This affects HCL Domino servers with vulnerable XML parser configurations. Attackers can exploit this by submitting specially crafted XML documents to vulnerable endpoints.

💻 Affected Systems

Products:
  • HCL Domino
Versions: Versions prior to 11.0.1 FP6 and 12.0.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Domino servers with XML processing capabilities enabled. The vulnerability exists in the XML parser configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server filesystem disclosure including sensitive configuration files, password files, and application data leading to full system compromise.

🟠

Likely Case

Unauthorized reading of sensitive server files containing configuration data, credentials, or application data.

🟢

If Mitigated

Limited impact with proper XML parser hardening and input validation in place.

🌐 Internet-Facing: HIGH - Web applications processing XML input from untrusted sources are directly exploitable.
🏢 Internal Only: MEDIUM - Internal applications processing XML from authenticated users could still be exploited.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XXE vulnerabilities are well-understood with readily available exploit techniques. Exploitation requires sending malicious XML to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: HCL Domino 11.0.1 FP6 and 12.0.0

Vendor Advisory: https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097124

Restart Required: Yes

Instructions:

1. Download and install HCL Domino 11.0.1 FP6 or 12.0.0 from HCL support portal. 2. Apply the update to all affected Domino servers. 3. Restart the Domino server services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable XXE in XML parser

all

Configure XML parsers to disable external entity processing

Set XML parser properties: FEATURE_SECURE_PROCESSING=true, DISALLOW_DOCTYPE_DECL=true

Input validation and sanitization

all

Implement strict XML input validation and sanitization

Implement XML schema validation
Use allowlists for XML elements and attributes

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable servers from untrusted networks
  • Deploy web application firewall (WAF) with XXE protection rules

🔍 How to Verify

Check if Vulnerable:

Check Domino version using 'tell http show version' command and compare against vulnerable versions (prior to 11.0.1 FP6 or 12.0.0)

Check Version:

tell http show version

Verify Fix Applied:

Verify installed version is 11.0.1 FP6 or 12.0.0+ and test XML processing endpoints with XXE payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • Multiple failed XML parsing attempts
  • Requests with DOCTYPE declarations in XML payloads

Network Indicators:

  • HTTP requests containing XML with external entity references
  • Unusual outbound connections from server following XML processing

SIEM Query:

source="domino.log" AND ("DOCTYPE" OR "ENTITY" OR "SYSTEM") AND xml

🔗 References

📤 Share & Export