CVE-2024-2835

8.7 HIGH

📋 TL;DR

A stored cross-site scripting vulnerability in OpenText ArcSight Enterprise Security Manager and ArcSight Platform allows attackers to inject malicious scripts that execute when users view affected pages. This affects organizations using vulnerable versions of these security monitoring products. The vulnerability can be exploited remotely without authentication.

💻 Affected Systems

Products:
  • OpenText ArcSight Enterprise Security Manager
  • OpenText ArcSight Platform
Versions: Specific versions not detailed in references; check vendor advisory for exact affected versions.
Operating Systems: All supported OS platforms for ArcSight
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default configurations; no special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of ArcSight console, session hijacking, credential theft, and lateral movement within the security infrastructure.

🟠

Likely Case

Session hijacking, credential theft, and unauthorized access to security monitoring data.

🟢

If Mitigated

Limited impact with proper input validation and output encoding controls in place.

🌐 Internet-Facing: HIGH - Remote exploitation possible without authentication.
🏢 Internal Only: HIGH - Even internal attackers can exploit this stored XSS vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Stored XSS vulnerabilities typically have low exploitation complexity once the injection point is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://portal.microfocus.com/s/article/KM000029773

Restart Required: Yes

Instructions:

1. Review vendor advisory KM000029773. 2. Download appropriate patch from OpenText support portal. 3. Apply patch following vendor instructions. 4. Restart affected ArcSight services. 5. Verify fix implementation.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement strict input validation and proper output encoding for user-supplied data in ArcSight interfaces.

Content Security Policy

all

Implement Content Security Policy headers to restrict script execution.

🧯 If You Can't Patch

  • Isolate ArcSight management interfaces from untrusted networks
  • Implement web application firewall rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check ArcSight version against vendor advisory; test for XSS injection in user input fields.

Check Version:

Check ArcSight version through administration console or configuration files.

Verify Fix Applied:

Verify patch installation and test that XSS payloads no longer execute in ArcSight interfaces.

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags or JavaScript in ArcSight logs
  • Multiple failed XSS attempts

Network Indicators:

  • HTTP requests containing XSS payloads to ArcSight endpoints

SIEM Query:

Search for patterns like <script>, javascript:, or encoded XSS payloads in web request logs to ArcSight.

🔗 References

📤 Share & Export