CVE-2023-28008

7.1 HIGH

📋 TL;DR

HCL Workload Automation versions 9.4, 9.5, and 10.1 contain an XML External Entity (XXE) vulnerability that allows remote attackers to read sensitive files from the server or cause denial of service through memory consumption. This affects organizations using these versions of HCL's workload automation software for job scheduling and management.

💻 Affected Systems

Products:
  • HCL Workload Automation
Versions: 9.4, 9.5, 10.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of specified versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through sensitive file disclosure (including configuration files, credentials, system files) leading to data breach and potential lateral movement.

🟠

Likely Case

Unauthorized reading of sensitive server files containing configuration data, credentials, or other proprietary information.

🟢

If Mitigated

Limited impact with proper network segmentation and XML parsing restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XXE vulnerabilities typically have low exploitation complexity once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fixes per HCL advisory KB0104371

Vendor Advisory: https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0104371

Restart Required: Yes

Instructions:

1. Review HCL advisory KB0104371. 2. Download appropriate patches from HCL support portal. 3. Apply patches following HCL documentation. 4. Restart affected services. 5. Verify fix implementation.

🔧 Temporary Workarounds

Disable XML External Entity Processing

all

Configure XML parsers to disable external entity resolution

Configure XML parser settings: set features like FEATURE_SECURE_PROCESSING to true, disable external entities

Input Validation and Sanitization

all

Implement strict input validation for XML data

Implement XML schema validation, reject XML with DOCTYPE declarations, use allowlists for XML content

🧯 If You Can't Patch

  • Network segmentation: Isolate HCL Workload Automation servers from untrusted networks
  • Implement web application firewall (WAF) with XXE protection rules

🔍 How to Verify

Check if Vulnerable:

Check installed version against affected versions (9.4, 9.5, 10.1)

Check Version:

Consult HCL documentation for version check commands specific to your installation

Verify Fix Applied:

Verify patch installation and test XXE payloads are rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • Multiple large XML file processing attempts
  • External entity resolution attempts in logs

Network Indicators:

  • XML payloads containing external entity references
  • Unusual outbound connections from HCL servers during XML processing

SIEM Query:

source="hcl_workload_automation" AND (xml_parse_error OR external_entity)

🔗 References

📤 Share & Export