CVE-2025-63401

5.5 MEDIUM

📋 TL;DR

A Cross-Site Scripting (XSS) vulnerability in HCLTech DRAGON allows remote attackers to inject malicious scripts into web pages viewed by other users. This affects all HCLTech DRAGON installations before version 7.6.0. Attackers can potentially steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • HCLTech DRAGON
Versions: All versions before 7.6.0
Operating Systems: All supported OS
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with web interface accessible to users are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals administrator credentials, takes full control of the DRAGON system, and uses it as a foothold to attack internal networks.

🟠

Likely Case

Attacker steals user session cookies to impersonate legitimate users, accesses sensitive data, or performs unauthorized actions within the application.

🟢

If Mitigated

Script execution is blocked by Content Security Policy or input validation, limiting impact to minor UI disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically require user interaction (clicking a malicious link) but are easy to exploit once the injection point is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.0

Vendor Advisory: https://excalibur-hcl.my.salesforce.com/sfc/p/#U0000000YO14/a/Pf000003dyQn/x0oUOgfHG6F0wUhpmSMcmXMuwO2GYuSf_duzWPRebao

Restart Required: Yes

Instructions:

1. Download HCLTech DRAGON version 7.6.0 from official vendor sources. 2. Backup current installation and data. 3. Apply the update following HCL's upgrade documentation. 4. Restart all DRAGON services. 5. Verify functionality post-update.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to block inline script execution and restrict script sources.

Add 'Content-Security-Policy: script-src 'self'' to web server configuration

Input Validation Filter

all

Deploy WAF or application filter to sanitize user input containing script tags.

Configure WAF rules to block <script>, javascript:, and on* attributes

🧯 If You Can't Patch

  • Isolate DRAGON application behind reverse proxy with strict input validation
  • Implement network segmentation to limit DRAGON access to trusted users only

🔍 How to Verify

Check if Vulnerable:

Check DRAGON version via admin interface or configuration files. If version is below 7.6.0, system is vulnerable.

Check Version:

Check web interface footer or consult DRAGON administration documentation for version check procedure

Verify Fix Applied:

Confirm version is 7.6.0 or higher and test XSS payloads are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual long parameter values in web logs
  • Requests containing script tags or javascript: URIs
  • Multiple failed login attempts from same session

Network Indicators:

  • Outbound connections to unknown domains following DRAGON access
  • Unusual traffic patterns to DRAGON web endpoints

SIEM Query:

web.url CONTAINS "<script>" OR web.url CONTAINS "javascript:" AND dest.app="HCL DRAGON"

🔗 References

📤 Share & Export