Latest update date of this article:
2025-01-23
General information
An XSS vulnerability has been discovered in Nexus Digital Access.
A URL query parameter on the password reset page in self-service is vulnerable to XSS injection. This means that if the session cookies are not configured in a secure manner an evil attacker could craft a link that can give access to sensitive information and possibly overtaking the session. In order to exploit this an authenticated user must be tricked to visit a vulnerable link.
Versions affected
All Digital Access versions currently not EOL are affected by this vulnerability.
Step-by-step instruction to resolve and remove the vulnerability
Make sure that cookies are handled securely. In the Administration service: Go to Manage System > Access Points > Manage Global Access Point Settings > Advanced settings
The following checkboxes must be checked:Click Browse in the upper right corner of the window:
Locate the passwordSet.js file under access-point/built-in-files/wwwroot/wa/scripts
Click the edit symbol (sheet with a pencil) and edit the file as explained below:
In the method loadPage locate this row:
$(".form-message").html( decodeUrlParameter(decodeURI( message ) )) ;
Change it (by replacing html with text) to:
$(".form-message").text( decodeUrlParameter(decodeURI( message ) )) ;
In the method displaySuccessMessage locate this row:
$(".form-message").html( decodeUrlParameter( message ) );
Change it (by replacing html with text) to:
$(".form-message").text( decodeUrlParameter( message ) );
Click Save and close the browser window.
Click Publish (it may not be blue at this point but it will still work).
Validate the fix by visiting the following link:
https://<your dns name>/wa/passwordSet.html?userID=testuser</script>&phoneNumber=&message=<script>alert(%27if%20this%20is%20shown%20in%20a%20popup%20the%20system%20is%20not%20safe.%20If%20it%20is%20shown%20in%20the%20web%20page%20the%20system%20is%20safe%27);</script>
The dns name must be modified to the server dns name.
A popup should not be shown and if this is the case the system is no longer vulnerable for this issue.
Contact Nexus support for more details.