CVE-2023-37520

7.7 HIGH

📋 TL;DR

An unauthenticated stored cross-site scripting (XSS) vulnerability in BigFix Server version 9.5.12.68 allows attackers to inject malicious scripts into the Gather Status Report, which is served by BigFix Relay. This could enable data exfiltration, session hijacking, or other malicious actions when users view the compromised report. Organizations running the affected BigFix Server version are vulnerable.

💻 Affected Systems

Products:
  • HCL BigFix Server
Versions: 9.5.12.68
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the Gather Status Report feature served by BigFix Relay. No special configuration is required to be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal sensitive data (credentials, system information), hijack user sessions, redirect users to malicious sites, or perform actions on behalf of authenticated users.

🟠

Likely Case

Attackers would inject malicious scripts to steal session cookies or credentials from users who view the compromised Gather Status Report, potentially gaining unauthorized access to the BigFix console.

🟢

If Mitigated

With proper web application firewalls (WAFs), content security policies (CSP), and input validation, the impact would be limited to potential script execution being blocked or contained.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

As an unauthenticated stored XSS, exploitation requires injecting malicious scripts into the Gather Status Report, which then executes when users view it. No authentication is needed to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.5.12.69 or later

Vendor Advisory: https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109376

Restart Required: Yes

Instructions:

1. Download the latest patch from HCL BigFix support portal. 2. Apply the patch to the BigFix Server. 3. Restart the BigFix Server services. 4. Verify the patch is applied by checking the version.

🔧 Temporary Workarounds

Disable Gather Status Report

all

Temporarily disable the vulnerable Gather Status Report feature to prevent exploitation.

Consult BigFix documentation for disabling specific report features

Implement Content Security Policy (CSP)

all

Add CSP headers to restrict script execution from untrusted sources.

Add 'Content-Security-Policy' header with appropriate directives in web server configuration

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with XSS protection rules to block malicious payloads.
  • Restrict access to the BigFix Server console to trusted networks only and monitor for unusual activity.

🔍 How to Verify

Check if Vulnerable:

Check the BigFix Server version. If it is 9.5.12.68, it is vulnerable. Review system logs for any suspicious script injections in Gather Status Reports.

Check Version:

On BigFix Server, run: 'besadmin -version' or check the console version in the BigFix UI.

Verify Fix Applied:

After patching, verify the BigFix Server version is 9.5.12.69 or later. Test the Gather Status Report feature to ensure no XSS payloads execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags or JavaScript code in Gather Status Report logs
  • Multiple failed attempts to access or modify report data

Network Indicators:

  • HTTP requests containing suspicious script payloads to BigFix Relay endpoints
  • Unexpected data exfiltration from the BigFix Server

SIEM Query:

source="bigfix_logs" AND ("Gather Status Report" OR "XSS" OR "script")

🔗 References

📤 Share & Export