CVE-2025-35059

4.3 MEDIUM

📋 TL;DR

This vulnerability in Newforma Info Exchange (NIX) allows unauthenticated attackers to redirect users to arbitrary external websites via the 'nhl' parameter in the '/DownloadWeb/hyperlinkredirect.aspx' endpoint. This affects all organizations using vulnerable versions of NIX software, potentially enabling phishing attacks and credential theft.

💻 Affected Systems

Products:
  • Newforma Info Exchange (NIX)
Versions: Specific versions not detailed in CVE; all versions with vulnerable endpoint
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the affected endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could redirect users to malicious sites that steal credentials, install malware, or conduct sophisticated phishing campaigns, potentially leading to full system compromise.

🟠

Likely Case

Most attackers would use this for phishing campaigns to steal user credentials or distribute malware through convincing redirects.

🟢

If Mitigated

With proper web application firewalls and user education about suspicious links, impact is limited to potential user confusion from unexpected redirects.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only crafting a URL with malicious redirect parameter; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Newforma vendor advisory for specific patched versions

Vendor Advisory: https://www.newforma.com/security-advisories

Restart Required: No

Instructions:

1. Check Newforma security advisory for patch details. 2. Apply the latest security update from Newforma. 3. Verify the '/DownloadWeb/hyperlinkredirect.aspx' endpoint no longer accepts unvalidated redirects.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block or monitor requests to the vulnerable endpoint with suspicious redirect parameters

WAF-specific configuration to block requests containing 'nhl' parameter with external URLs

URL Rewrite Rule

iis

Implement IIS URL rewrite rules to restrict redirect functionality

<rule name="BlockNIXRedirect" stopProcessing="true">
  <match url="hyperlinkredirect\.aspx" />
  <conditions>
    <add input="{QUERY_STRING}" pattern="nhl=.*" />
  </conditions>
  <action type="CustomResponse" statusCode="403" />
</rule>

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to NIX server from untrusted networks
  • Deploy web application firewall with rules to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Test by accessing http://[nix-server]/DownloadWeb/hyperlinkredirect.aspx?nhl=http://external-malicious-site.com and checking if redirect occurs

Check Version:

Check NIX administration panel or consult Newforma documentation for version information

Verify Fix Applied:

Attempt the same test after patching; successful fix should block or sanitize the redirect

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to '/DownloadWeb/hyperlinkredirect.aspx' with 'nhl' parameter containing external domains
  • Unusual redirect patterns in web server logs

Network Indicators:

  • Outbound connections from NIX server to unexpected external domains following redirect requests

SIEM Query:

source="web_server" AND url="*hyperlinkredirect.aspx*" AND query_string="*nhl=*"

🔗 References

📤 Share & Export