CVE-2022-38657

8.2 HIGH

📋 TL;DR

This vulnerability allows attackers to redirect users to malicious websites by exploiting the Feedback action on the manager page. It affects HCL software users who have access to the vulnerable manager interface. The open redirect can be used in phishing attacks to steal credentials or deliver malware.

💻 Affected Systems

Products:
  • HCL software with vulnerable manager interface
Versions: Specific versions not detailed in provided references
Operating Systems: All platforms running affected HCL software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to the manager page Feedback action. Exact product names and versions should be verified against vendor advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users are redirected to sophisticated phishing sites that steal credentials, install malware, or conduct further attacks against the organization.

🟠

Likely Case

Attackers use the redirect in phishing campaigns to harvest credentials or deliver malware to users who trust the legitimate domain.

🟢

If Mitigated

With proper web filtering and user awareness training, the impact is limited to failed phishing attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Open redirect vulnerabilities are commonly exploited in phishing campaigns. Requires user interaction to click a crafted link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097201

Restart Required: Yes

Instructions:

1. Review vendor advisory KB0097201. 2. Apply the recommended patch from HCL. 3. Restart affected services. 4. Verify the fix by testing the Feedback action.

🔧 Temporary Workarounds

Disable Feedback Action

all

Temporarily disable or restrict access to the Feedback action on manager pages

Configuration specific to HCL software - consult documentation

Implement URL Validation

all

Add server-side validation to reject redirects to external domains

Implementation depends on specific HCL software architecture

🧯 If You Can't Patch

  • Implement web application firewall rules to block redirects to external domains from Feedback endpoints
  • Deploy network filtering to block known malicious domains and monitor for suspicious redirect patterns

🔍 How to Verify

Check if Vulnerable:

Test the Feedback action by attempting to redirect to an external domain parameter

Check Version:

Check HCL software version using product-specific commands or administration interface

Verify Fix Applied:

After patching, test that redirects to external domains are blocked or properly validated

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns from Feedback endpoints
  • Multiple failed redirect attempts
  • Requests with external domain parameters in Feedback URLs

Network Indicators:

  • Outbound connections to suspicious domains following Feedback page access
  • Unusual redirect chains in HTTP traffic

SIEM Query:

web.url contains "feedback" AND web.url contains "http://" OR web.url contains "https://" AND NOT web.url contains "yourdomain.com"

🔗 References

📤 Share & Export