CVE-2022-43575

5.4 MEDIUM

📋 TL;DR

IBM Aspera Console versions 3.4.0 through 3.4.2 PL5 contain a cross-site scripting (XSS) vulnerability that allows authenticated users to inject malicious JavaScript into the web interface. This could enable attackers to steal session credentials or manipulate the application within a trusted user's browser session. Organizations using affected IBM Aspera Console versions are at risk.

💻 Affected Systems

Products:
  • IBM Aspera Console
Versions: 3.4.0 through 3.4.2 PL5
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to exploit. All deployments with affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, perform actions as authenticated users, and potentially gain full control of the Aspera Console system.

🟠

Likely Case

Attackers could steal user session cookies or credentials, perform unauthorized actions within the application, and potentially pivot to other systems using stolen authentication.

🟢

If Mitigated

With proper input validation and output encoding, the attack surface is reduced, but the vulnerability still exists in the codebase until patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities are commonly exploited and require authenticated access. Attack complexity is low once an attacker gains user credentials or tricks a user into visiting a malicious page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.2 PL6 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7155215

Restart Required: Yes

Instructions:

1. Download IBM Aspera Console 3.4.2 PL6 or later from IBM Fix Central. 2. Backup current configuration and data. 3. Stop Aspera Console services. 4. Install the updated version. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall (WAF) rules to filter malicious script inputs

WAF-specific configuration required

Content Security Policy

all

Implement strict CSP headers to limit script execution

Add 'Content-Security-Policy' header with script-src restrictions

🧯 If You Can't Patch

  • Implement strict input validation and output encoding at the application layer
  • Use Content Security Policy (CSP) headers to restrict script execution sources

🔍 How to Verify

Check if Vulnerable:

Check Aspera Console version via web interface or configuration files. If version is between 3.4.0 and 3.4.2 PL5 inclusive, system is vulnerable.

Check Version:

Check web interface admin panel or examine installation directory version files

Verify Fix Applied:

Verify version is 3.4.2 PL6 or later. Test XSS payloads in user input fields to confirm they are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in HTTP requests
  • Multiple failed login attempts followed by successful login
  • Suspicious user agent strings containing script tags

Network Indicators:

  • HTTP requests containing script tags or JavaScript in parameters
  • Unusual outbound connections from Aspera Console server

SIEM Query:

source="aspera_console" AND (http_request contains "<script>" OR http_request contains "javascript:" OR http_request contains "onerror=" OR http_request contains "onload=")

🔗 References

📤 Share & Export