CVE-2022-27562

4.6 MEDIUM

📋 TL;DR

CVE-2022-27562 is an unsafe file upload vulnerability in HCL Domino Volt that allows attackers to upload .html files containing malicious JavaScript. When deployed applications process these files, the JavaScript executes in users' browsers, potentially leading to client-side attacks. This affects organizations using HCL Domino Volt for application development.

💻 Affected Systems

Products:
  • HCL Domino Volt
Versions: Versions prior to 1.0.6
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Domino Volt applications that allow file uploads. The vulnerability exists in the default file type filter policy.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could upload malicious HTML files that execute JavaScript to steal session cookies, perform cross-site request forgery, redirect users to phishing sites, or conduct client-side attacks against application users.

🟠

Likely Case

Attackers upload HTML files with malicious JavaScript that executes when users access the uploaded content, potentially leading to session hijacking, data theft, or unauthorized actions on behalf of authenticated users.

🟢

If Mitigated

With proper input validation and file type restrictions, the risk is limited to potential file storage abuse without code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to upload files to vulnerable applications. The vulnerability is in the default configuration, making exploitation straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.0.6 and later

Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120722

Restart Required: Yes

Instructions:

1. Download HCL Domino Volt version 1.0.6 or later from HCL's official distribution channels. 2. Follow HCL's upgrade documentation for Domino Volt. 3. Restart the Domino Volt service after installation. 4. Verify the update by checking the version number.

🔧 Temporary Workarounds

Implement custom file type validation

all

Add server-side validation to reject .html file uploads in Domino Volt applications

Implement custom validation logic in application code to check file extensions before processing

Restrict file upload permissions

all

Limit which users can upload files to Domino Volt applications

Configure application permissions to restrict file upload capabilities to trusted users only

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict JavaScript execution from uploaded content
  • Deploy web application firewall (WAF) rules to block .html file uploads to Domino Volt applications

🔍 How to Verify

Check if Vulnerable:

Check Domino Volt version. If version is earlier than 1.0.6 and the application allows file uploads, it is vulnerable.

Check Version:

Check Domino Volt administration interface or configuration files for version information

Verify Fix Applied:

Verify Domino Volt version is 1.0.6 or later and test that .html file uploads are properly rejected.

📡 Detection & Monitoring

Log Indicators:

  • Multiple .html file upload attempts
  • File upload errors related to .html extensions
  • Unusual file upload patterns to Domino Volt applications

Network Indicators:

  • HTTP POST requests with .html file uploads to Domino Volt endpoints
  • Increased file upload traffic to Domino Volt applications

SIEM Query:

source="domino_volt" AND (file_extension=".html" OR file_type="text/html") AND action="upload"

🔗 References

📤 Share & Export