CVE-2024-42200

5.4 MEDIUM

📋 TL;DR

HCL BigFix Web Reports has a stored cross-site scripting vulnerability that allows attackers to inject malicious scripts into web pages. When users view affected pages, the scripts execute in their browsers, potentially stealing session cookies or performing unauthorized actions. Organizations using vulnerable versions of HCL BigFix Web Reports are affected.

💻 Affected Systems

Products:
  • HCL BigFix Web Reports
Versions: Versions prior to 11.0.4
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, deface web interfaces, or redirect users to malicious sites, potentially leading to full system compromise.

🟠

Likely Case

Attackers with access to the application could inject malicious scripts that steal session cookies or perform unauthorized actions when legitimate users view affected pages.

🟢

If Mitigated

With proper input validation and output encoding, the risk is limited to authenticated users who can inject scripts, but impact is contained to session hijacking within the application.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to inject malicious scripts, but once injected, the attack affects all users viewing the compromised page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 11.0.4

Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120585

Restart Required: Yes

Instructions:

1. Download HCL BigFix Web Reports version 11.0.4 from HCL support portal. 2. Backup current installation. 3. Stop BigFix services. 4. Apply the update following vendor documentation. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation to sanitize user-supplied data before processing.

Content Security Policy

all

Implement Content Security Policy headers to restrict script execution sources.

🧯 If You Can't Patch

  • Restrict access to BigFix Web Reports to trusted users only using network segmentation
  • Implement web application firewall rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check BigFix Web Reports version via web interface or configuration files. Versions below 11.0.4 are vulnerable.

Check Version:

Check web interface or consult BigFix documentation for version verification commands specific to your deployment.

Verify Fix Applied:

Verify version is 11.0.4 or higher and test input fields for proper sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags or JavaScript in user input fields
  • Multiple failed input validation attempts

Network Indicators:

  • HTTP requests containing suspicious script payloads to BigFix endpoints

SIEM Query:

source="bigfix_web_reports" AND (http_uri CONTAINS "<script>" OR http_body CONTAINS "javascript:")

🔗 References

📤 Share & Export