CVE-2023-30639

7.1 HIGH

📋 TL;DR

Archer Platform versions before 6.12 P6 HF1 contain a stored cross-site scripting (XSS) vulnerability that allows authenticated attackers to inject malicious scripts into the application data store. When other users view the compromised data, the scripts execute in their browsers, potentially stealing session cookies or performing unauthorized actions. This affects all Archer Platform deployments running vulnerable versions.

💻 Affected Systems

Products:
  • Archer Platform
Versions: 6.8 through 6.12 P6 HF1 (excluding 6.11.P4 and 6.12.0.6.1)
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to exploit. Both on-premises and cloud deployments are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator session cookies, gain full administrative access to the Archer Platform, exfiltrate sensitive data, or perform destructive actions across the entire application.

🟠

Likely Case

Attackers would use this to steal user session cookies, perform account takeover, and access sensitive information within the compromised user's permissions.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the Archer Platform. The vulnerability is in the application's data storage mechanism where user input isn't properly sanitized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.11.P4 (6.11.0.4) or 6.12 P6 HF1 (6.12.0.6.1)

Vendor Advisory: https://www.archerirm.community/t5/security-advisories/archer-update-for-stored-cross-site-scripting/ta-p/697581

Restart Required: Yes

Instructions:

1. Download the appropriate patch from RSA Archer support portal. 2. Backup your Archer Platform instance. 3. Apply the patch following RSA Archer's upgrade documentation. 4. Restart the Archer Platform services. 5. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation on all user-submitted fields to reject or sanitize HTML/JavaScript content

Content Security Policy

all

Implement a strict Content Security Policy header to prevent execution of inline scripts

Content-Security-Policy: default-src 'self'; script-src 'self'

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block XSS payloads in HTTP requests
  • Enforce principle of least privilege by reviewing and reducing user permissions to minimize potential impact

🔍 How to Verify

Check if Vulnerable:

Check Archer Platform version via Archer Control Panel > About or via Archer API endpoint /api/core/system/version

Check Version:

curl -k -H "Authorization: Bearer <token>" https://<archer-host>/api/core/system/version

Verify Fix Applied:

Verify version is 6.11.0.4 or 6.12.0.6.1 or later, then test XSS payloads in user input fields to confirm they're properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTML/JavaScript patterns in user input fields
  • Multiple failed XSS attempts from same user
  • Unexpected script tags in application data

Network Indicators:

  • HTTP requests containing common XSS payload patterns like <script>, javascript:, or onerror=

SIEM Query:

source="archer_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export