CVE-2023-37504
📋 TL;DR
HCL Compass fails to properly invalidate user sessions upon logout, allowing session hijacking. Attackers who obtain valid session identifiers can reuse them to impersonate authenticated users. This affects all HCL Compass deployments using vulnerable versions.
💻 Affected Systems
- HCL Compass
📦 What is this software?
Hcl Compass by Hcltech
Hcl Compass by Hcltech
Hcl Compass by Hcltech
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain unauthorized access to sensitive data, perform privileged actions, or compromise entire systems by reusing stolen session tokens of administrators or high-privilege users.
Likely Case
Attackers with network access or insider knowledge steal session cookies/tokens and gain unauthorized access to user accounts, potentially accessing confidential information or performing unauthorized actions.
If Mitigated
With proper network segmentation, session monitoring, and short session timeouts, impact is limited to potential unauthorized access within the application's scope.
🎯 Exploit Status
Exploitation requires obtaining valid session identifiers through network sniffing, XSS, or other means, then replaying them. No authentication bypass needed once session ID is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 23.1.2 and later
Vendor Advisory: https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107511
Restart Required: Yes
Instructions:
1. Download HCL Compass version 23.1.2 or later from HCL support portal. 2. Backup current installation and data. 3. Run installer with administrative privileges. 4. Restart all Compass services. 5. Verify successful upgrade.
🔧 Temporary Workarounds
Implement Session Timeout
allConfigure short session timeout values to limit window for session replay attacks
Modify session timeout in Compass configuration files (typically web.xml or server configuration)
Network Segmentation
allRestrict access to Compass application to trusted networks only
Configure firewall rules to limit access to Compass ports (typically 8080, 8443)
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach the Compass application
- Deploy web application firewall with session fixation protection rules
- Monitor for unusual session activity and implement alerting
- Educate users to clear browser sessions and use private browsing when accessing sensitive applications
🔍 How to Verify
Check if Vulnerable:
Check HCL Compass version via administration console or by examining installed version in program files. Versions below 23.1.2 are vulnerable.
Check Version:
Check Compass version via administration interface or examine version.txt in installation directory
Verify Fix Applied:
After patching, verify version is 23.1.2 or later. Test logout functionality to confirm sessions are properly invalidated.
📡 Detection & Monitoring
Log Indicators:
- Multiple successful logins from same session ID after logout events
- Session IDs being used from unexpected IP addresses or geolocations
- Unusual session duration exceeding configured timeout
Network Indicators:
- HTTP requests with same session cookie from multiple IP addresses
- Session tokens transmitted over unencrypted connections
SIEM Query:
source="compass_logs" AND (event="logout" OR event="session_invalidate") | stats count by session_id | where count > 1