CVE-2023-37502

9.0 CRITICAL

📋 TL;DR

HCL Compass has an unrestricted file upload vulnerability that allows attackers to upload malicious files containing executable code. This could lead to remote code execution on the server or client-side attacks via users' web browsers. All organizations using vulnerable versions of HCL Compass are affected.

💻 Affected Systems

Products:
  • HCL Compass
Versions: Versions prior to 23.1.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with file upload functionality enabled are vulnerable. The vulnerability affects the web interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through remote code execution, data theft, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Server compromise leading to data exfiltration, installation of malware, or use of the server as a pivot point for further attacks.

🟢

If Mitigated

Limited impact through proper file upload validation and execution restrictions, potentially only affecting file integrity.

🌐 Internet-Facing: HIGH - Directly accessible web interfaces allow unauthenticated or authenticated attackers to exploit this vulnerability remotely.
🏢 Internal Only: HIGH - Even internally accessible instances can be exploited by malicious insiders or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires file upload capability but appears straightforward based on the CWE-434 classification and CVSS score.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.1.2 and later

Vendor Advisory: https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107510

Restart Required: Yes

Instructions:

1. Download HCL Compass version 23.1.2 or later from HCL support portal. 2. Backup current installation and data. 3. Run the installer to upgrade. 4. Restart all Compass services. 5. Verify functionality post-upgrade.

🔧 Temporary Workarounds

Disable file upload functionality

all

Temporarily disable or restrict file upload features in HCL Compass configuration

Modify web.xml or application configuration to remove/restrict file upload servlets

Implement web application firewall rules

all

Block malicious file uploads at the network perimeter

Configure WAF to block file uploads with executable extensions (.jsp, .php, .exe, etc.)

🧯 If You Can't Patch

  • Implement strict file type validation at the application layer
  • Deploy network segmentation to isolate HCL Compass from critical systems

🔍 How to Verify

Check if Vulnerable:

Check HCL Compass version via administrative interface or by examining installation files. Versions below 23.1.2 are vulnerable.

Check Version:

Check Compass version via web interface at /compass/admin or examine version.txt in installation directory

Verify Fix Applied:

Verify version is 23.1.2 or higher and test file upload functionality with various file types to ensure validation is working.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activity
  • Files with executable extensions being uploaded
  • Multiple failed upload attempts

Network Indicators:

  • POST requests to file upload endpoints with unusual file types
  • Traffic patterns indicating file upload exploitation

SIEM Query:

source="hcl_compass" AND (event="file_upload" AND file_extension IN ("jsp","php","exe","bat"))

🔗 References

📤 Share & Export