Skip to main content

CVE-2024-30115: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in HCL Software HCL Domino Leap

Medium
VulnerabilityCVE-2024-30115cvecve-2024-30115cwe-79
Published: Wed Apr 30 2025 (04/30/2025, 21:14:20 UTC)
Source: CVE
Vendor/Project: HCL Software
Product: HCL Domino Leap

Description

Insufficient sanitization policy in HCL Leap allows client-side script injection in the deployed application through the HTML widget.

AI-Powered Analysis

AILast updated: 06/25/2025, 20:44:26 UTC

Technical Analysis

CVE-2024-30115 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting HCL Software's HCL Domino Leap product versions 1.0 through 1.0.5 and 1.1 through 1.1.3. The vulnerability arises due to insufficient input sanitization in the HTML widget component of the application, which allows an attacker to inject malicious client-side scripts into the deployed web application. When a user interacts with the compromised widget, the injected script executes in their browser context, potentially leading to unauthorized actions such as session hijacking, credential theft, or manipulation of displayed content. The vulnerability requires low privileges (PR:L) but does require user interaction (UI:R), such as clicking a crafted link or interacting with a malicious widget. The attack vector is network-based (AV:N), meaning exploitation can occur remotely over the internet without physical access. The CVSS v3.1 base score is 6.3, indicating a medium severity level, with high impact on confidentiality, limited impact on integrity, and no impact on availability. No known exploits are currently reported in the wild, and no official patches have been released at the time of this analysis. The vulnerability was publicly disclosed on April 30, 2025, with the reservation date being March 22, 2024. The issue stems from improper neutralization of input during web page generation, a common cause of XSS vulnerabilities, which can be mitigated by robust input validation and output encoding practices.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on HCL Domino Leap for collaborative applications and workflow automation. Successful exploitation could lead to unauthorized disclosure of sensitive information, including user credentials and session tokens, compromising confidentiality. Attackers could also perform actions on behalf of legitimate users, potentially leading to data manipulation or unauthorized access to internal resources, although the integrity impact is limited. Since availability is not affected, service disruption is unlikely. However, the breach of confidentiality and potential for lateral movement within networks pose risks to compliance with stringent European data protection regulations such as GDPR. Organizations in sectors like finance, healthcare, government, and critical infrastructure that use HCL Domino Leap may face reputational damage, regulatory penalties, and operational risks if exploited. The requirement for user interaction means social engineering or phishing campaigns could be leveraged to trigger the exploit, increasing the attack surface in environments with less security awareness.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific actions: 1) Immediately audit all instances of HCL Domino Leap to identify affected versions (1.0 to 1.0.5 and 1.1 to 1.1.3) and prioritize upgrading to a patched version once available. 2) Until patches are released, apply strict Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce XSS impact. 3) Conduct a thorough review and hardening of input validation and output encoding mechanisms in any custom HTML widgets or extensions used within HCL Domino Leap deployments. 4) Educate users on the risks of interacting with unsolicited links or widgets, emphasizing phishing awareness to reduce the likelihood of user interaction exploitation. 5) Monitor web application logs and network traffic for unusual script injection attempts or anomalous user behavior indicative of exploitation attempts. 6) Employ web application firewalls (WAFs) with updated signatures to detect and block XSS payloads targeting HCL Domino Leap. 7) Coordinate with HCL Software support channels to receive timely updates and advisories regarding patches or workarounds. These targeted measures go beyond generic advice by focusing on the specific vulnerable component (HTML widget) and leveraging layered defenses to reduce exploitation risk in the absence of immediate patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
HCL
Date Reserved
2024-03-22T23:57:21.326Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbec9e1

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 6/25/2025, 8:44:26 PM

Last updated: 7/30/2025, 4:36:14 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats