CVE-2024-30147

6.5 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in HCL Leap that allows attackers to inject malicious scripts into both the authoring environment and deployed applications. The vulnerability affects organizations using HCL Leap for business process automation, potentially compromising user sessions and data integrity.

💻 Affected Systems

Products:
  • HCL Leap
Versions: Multiple versions prior to the fix
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both authoring environment and deployed applications. The vulnerability exists in multiple vectors within the application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, perform actions on behalf of authenticated users, or compromise sensitive data displayed in the application.

🟠

Likely Case

Attackers inject malicious scripts to steal user credentials or session tokens, potentially leading to account takeover and unauthorized access to business processes.

🟢

If Mitigated

With proper input validation and output encoding, the risk is reduced to minimal, though the vulnerability still exists in the codebase.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity once the injection point is identified. Exploitation requires user interaction with malicious content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to vendor advisory for specific fixed versions

Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0119900

Restart Required: Yes

Instructions:

1. Review the HCL advisory for affected versions. 2. Apply the recommended patch or upgrade to a fixed version. 3. Restart the HCL Leap application services. 4. Test functionality after patching.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement strict input validation and proper output encoding for all user-supplied data

Content Security Policy

all

Implement a strict Content Security Policy to mitigate XSS impact

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block XSS payloads
  • Restrict access to HCL Leap applications to trusted networks only

🔍 How to Verify

Check if Vulnerable:

Check HCL Leap version against affected versions listed in the vendor advisory

Check Version:

Check version through HCL Leap administration interface or consult system documentation

Verify Fix Applied:

Verify the installed version matches or exceeds the fixed version specified in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags or JavaScript in user input fields
  • Multiple failed input validation attempts

Network Indicators:

  • Requests containing suspicious script patterns or encoded payloads

SIEM Query:

web_requests WHERE (url CONTAINS "<script>" OR body CONTAINS "javascript:") AND dest_ip IN (hcl_leap_servers)

🔗 References

📤 Share & Export