CVE-2023-37519

7.7 HIGH

📋 TL;DR

CVE-2023-37519 is an unauthenticated stored cross-site scripting (XSS) vulnerability in the Download Status Report feature of BigFix Server. Attackers can inject malicious scripts that execute when users view the report, potentially compromising their sessions or stealing credentials. This affects organizations using vulnerable versions of HCL BigFix Platform.

💻 Affected Systems

Products:
  • HCL BigFix Platform
Versions: Versions prior to 10.0.10
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the BigFix Server component specifically. All deployments with the vulnerable version range are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack sessions, install malware on client systems through BigFix agents, or pivot to internal network systems.

🟠

Likely Case

Attackers would steal session cookies or credentials to gain unauthorized access to the BigFix console, potentially modifying configurations or deploying malicious software packages.

🟢

If Mitigated

With proper network segmentation and web application firewalls, impact would be limited to the BigFix server itself without lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

As an unauthenticated stored XSS, exploitation requires minimal technical skill once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.10

Vendor Advisory: https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109376

Restart Required: Yes

Instructions:

1. Download BigFix Platform version 10.0.10 from HCL support portal. 2. Backup current installation and configuration. 3. Run the upgrade installer following HCL documentation. 4. Restart BigFix services to apply changes.

🔧 Temporary Workarounds

Disable Download Status Report Access

all

Restrict access to the vulnerable report endpoint through web server configuration or firewall rules.

# Example Apache config: <Location /webreports/downloadstatus> Deny from all </Location>
# Example IIS: Remove handler mapping for downloadstatus endpoint

Web Application Firewall Rules

all

Implement WAF rules to block XSS payloads targeting the downloadstatus endpoint.

# Example ModSecurity rule: SecRule REQUEST_URI "@contains downloadstatus" "id:1001,phase:2,deny,msg:'Blocking CVE-2023-37519 exploit attempt'"

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers to prevent script execution from untrusted sources.
  • Isolate BigFix server network segment and restrict access to trusted administrative IPs only.

🔍 How to Verify

Check if Vulnerable:

Check BigFix Server version via console: 'version' command or review installation logs. Versions below 10.0.10 are vulnerable.

Check Version:

On BigFix Server: 'besadmin -version' or check 'BES Server\Logs\install.log' for version information

Verify Fix Applied:

After patching, verify version shows 10.0.10 or higher. Test the Download Status Report functionality with safe test payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /webreports/downloadstatus endpoint
  • JavaScript or HTML injection patterns in web server logs
  • Multiple failed authentication attempts following report access

Network Indicators:

  • HTTP requests containing script tags or JavaScript code to downloadstatus endpoint
  • Unusual outbound connections from BigFix server following report access

SIEM Query:

source="bigfix_web.log" AND (uri="/webreports/downloadstatus" AND (body="<script" OR body="javascript:" OR body="onerror=" OR body="onload="))

🔗 References

📤 Share & Export