Sunday, January 5, 2025
HomeCVE/vulnerabilityHCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

Published on

SIEM as a Service

Recently identified by security researchers, a new vulnerability in HCL DevOps Deploy and HCL Launch has emerged, allowing users to embed arbitrary HTML tags within the Web UI.

This vulnerability tracked as CVE-2024-42195, poses a potential risk of sensitive information disclosure to unauthorized individuals.

Below, we provide a detailed analysis of the affected products and versions, the nature of the vulnerability, and recommended actions to mitigate the risk.

- Advertisement - SIEM as a Service

Vulnerability Details

The vulnerability enables attackers to inject arbitrary HTML content into the Web UI of HCL DevOps Deploy and HCL Launch.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

If successfully exploited, this could lead to the exposure of sensitive information, possibly impacting the data integrity and confidentiality of users interacting with these platforms.

The relatively low CVSS score indicates that while the potential impact of the exploit could be severe in certain configurations, the complexity of successful exploitation is high, requiring lower privileges and no user interaction.

Affected Products and Versions

The following table outlines the specific product versions affected by this vulnerability:

Affected Product(s)Version(s)
HCL Launch7.0 – 7.0.5.24
HCL Launch7.1 – 7.1.2.20
HCL Launch7.2 – 7.2.3.13
HCL Launch7.3 – 7.3.2.8
HCL DevOps Deploy8.0 – 8.0.1.3

HCLSoftware urges users to update their systems to the latest patched versions to mitigate this vulnerability:

  • HCL Launch: Upgrade to versions 7.0.5.25, 7.1.2.21, 7.2.3.14, 7.3.2.9
  • HCL DevOps Deploy: Upgrade to version 8.0.1.4 or higher

These updates can be accessed through the HCL Software License and Download Portal. Organizations must apply these patches promptly to safeguard their environments against potential exploitation.

Currently, there are no workarounds or alternative mitigations. Users are strongly encouraged to apply the recommended updates as the primary method of addressing this issue.

Analyse Real-World Malware & Phishing Attacks With ANY.RUN - Get up to 3 Free Licenses

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...

Apple Agrees to $95M Settlement Over Siri Privacy Lawsuit

Apple Inc. has agreed to pay $95 million to settle a proposed class-action lawsuit...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...