Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Updated 2025-01-29.
Info

Latest update date of this article:
2025-01-2329

General information

An Two XSS vulnerability has vulnerabilities have been discovered in Nexus Digital Access.

Versions affected

A URL query parameter on the password reset page in self-service is vulnerable to XSS injection. This means that if the session cookies are not configured in a secure manner an evil attacker could craft a link that can give access to sensitive information and possibly overtaking the session. In order to exploit this an authenticated user must be tricked to visit a vulnerable link.

Versions affected

All Digital Access versions currently not EOL are affected by this vulnerabilityAll Digital Access versions currently not EOL are affected by these vulnerabilities.

Resolution

A patch version has been released to fix the XSS vulnerabilities in Digital Access 6.8.x. This version is called Digital Access 6.8.1 and it is available for download through the Support Portal (or by upgrading the versiontag.yml in the Docker Swarm setup). The version includes fixes for two XSS vulnerabilities, and it is highly recommended to upgrade to this release. See https://doc.nexusgroup.com/pub/release-notes-digital-access-component-6-8-1for more information.

Patch versions will be made available as they are completed in the remaining minor versions still in support. This article will be updated when these versions are available for download.

If upgrade to a patched version can not be completed currently, see the steps below to manually avoid the vulnerabilities.

Step-by-step instruction to resolve and remove the

...

vulnerabilities

  1. Make sure that cookies are handled securely. In the Administration service: Go to Manage System > Access Points > Manage Global Access Point Settings > Advanced settings
    The following checkboxes must be checked:

...

  1. Click Browse in the upper right corner of the window.

  2. Locate the passwordSet.js file under access-point/built-in-files/wwwroot/wa/scripts

  3. Click the edit symbol (sheet with a pencil) and edit the file as explained below:

    1. In the method loadPage locate this row:
      $(".form-message").html( decodeUrlParameter(decodeURI( message ) )) ;

      Change it (by replacing html with text) to:
      $(".form-message").text( decodeUrlParameter(decodeURI( message ) )) ;

    2. In the method displaySuccessMessage locate this row:
      $(".form-message").html( decodeUrlParameter( message ) );

      Change it (by replacing html with text) to:

      $(".form-message").text( decodeUrlParameter( message ) );

  4. Click Save and close the browser window.

  5. Click Publish (it may not be blue at this point but it will still work).

  6. Validate the fix by visiting the following link:

...

  1. )

...

The dns name must be modified to the server dns name.

A popup should not be shown and if this is the case the system is no longer vulnerable for this issue.

...

  1. .