CVE-2025-62330

5.9 MEDIUM

📋 TL;DR

HCL DevOps Deploy transmits sensitive information in cleartext over HTTP instead of redirecting to HTTPS as intended. This allows attackers with network access to intercept or modify user credentials and session data via passive monitoring or man-in-the-middle attacks. Organizations using vulnerable versions of HCL DevOps Deploy are affected.

💻 Affected Systems

Products:
  • HCL DevOps Deploy
Versions: Versions prior to the fix
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when HTTP port remains accessible without HTTPS redirection as configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept administrative credentials, gain full control of the DevOps Deploy system, and potentially compromise the entire software deployment pipeline.

🟠

Likely Case

Attackers capture user credentials and session tokens, leading to unauthorized access to deployment systems and potential data exfiltration.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to credential exposure requiring password resets.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access but no authentication; standard MITM tools can be used.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions

Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0127333

Restart Required: Yes

Instructions:

1. Review vendor advisory for fixed versions. 2. Apply the recommended patch/update. 3. Restart HCL DevOps Deploy services. 4. Verify HTTPS redirection is functioning correctly.

🔧 Temporary Workarounds

Block HTTP Port Access

all

Configure firewall rules to block external access to the HTTP port while maintaining HTTPS access.

# Example for Linux iptables: iptables -A INPUT -p tcp --dport 80 -j DROP
# Example for Windows Firewall: New-NetFirewallRule -DisplayName "Block HCL HTTP" -Direction Inbound -Protocol TCP -LocalPort 80 -Action Block

Configure Reverse Proxy with HTTPS Enforcement

linux

Place a reverse proxy (nginx, Apache) in front of HCL DevOps Deploy that enforces HTTPS and redirects all HTTP traffic.

# nginx example server block:
server {
    listen 80;
    server_name your-deploy-server;
    return 301 https://$server_name$request_uri;
}

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate HCL DevOps Deploy from untrusted networks.
  • Deploy network monitoring and intrusion detection to alert on cleartext credential transmission.

🔍 How to Verify

Check if Vulnerable:

Attempt to access the HCL DevOps Deploy interface via HTTP (port 80/tcp). If it loads without redirecting to HTTPS, the system is vulnerable.

Check Version:

Check the HCL DevOps Deploy administration interface or consult vendor documentation for version checking.

Verify Fix Applied:

After patching, verify that HTTP requests redirect to HTTPS with a 301/302 status code using curl: curl -I http://your-server

📡 Detection & Monitoring

Log Indicators:

  • HTTP traffic to DevOps Deploy port without subsequent HTTPS redirects
  • Failed login attempts from unexpected IPs following HTTP access

Network Indicators:

  • Cleartext HTTP traffic containing authentication headers or session cookies to DevOps Deploy port
  • ARP spoofing or unusual routing patterns in the network segment

SIEM Query:

source_port:80 AND dest_ip:[HCL_SERVER_IP] AND (http.cookie OR http.authorization)

🔗 References

📤 Share & Export