HCL BigFix is an endpoint management platform that has the capability to automate discovery, management, and remediation.
It can find and fix vulnerabilities on endpoints, whether it be on-premises, cloud, or virtual environments, regardless of the operating system, location, or connectivity.
Recent reports from HCL states that a redirect flaw in the login page allowed threat actors to redirect the client browser to external sites.
CVE-2023-28020: URL redirection in the Login page in HCL BigFix WebUI
This flaw exists in the login page of HCL BigFix WebUI, which allows an attacker to redirect the client browser to an external site via a redirect URL response header.
The severity of this vulnerability is given as 4.3 (medium).
HCL has released security patches for fixing this vulnerability along with several other vulnerabilities discovered by external researchers.
Other vulnerability patches
Several other vulnerabilities related to HCL BigFix that are patched, include
Prototype Pollution on SheetJS Community Edition before 0.19.3
SSRF Bypass on Node.js
Uncaught Exception triggers the killing of Node.js process
An uncaught Exception in socket.io kills the Node.js process
Authenticated users can do SQL queries via unparameterized SQL query
Weak Cipher Suites
Cross-Site Request Forgery allows access to server-side files
Affected Products and Fixed versions
WebUI Site NameFixed in VersionApplication Administration31Common79Custom42Insights19Patch40IVR7Patch Policies36Profile Management24Query34Software Distribution46WebUI API17WebUI Content App20WebUI CMEP13WebUI Data Sync24WebUI Framework26WebUI MDM18WebUI Permissions and Preferences19WebUI Reports15WebUI Take Action27WebUI SCM9WebUI Extensions5
Users of these products are recommended to upgrade to the latest version to prevent threat actors.
The post HCL BigFix WebUI Flaw Redirects User to External Site appeared first on Cyber Security News.
Cyber Security News