Pega continually works to implement security controls designed to protect client environments. With this focus, Pega has issued hotfixes for 3 medium security vulnerabilities in Pega Platform:
Issue |
Description |
Impact |
**D22 |
Cross Site Script (XSS) vulnerability |
Cross-site scripting (XSS) is an attack in which an attacker injects malicious executable scripts into the code of a trusted application or website. Attackers often initiate an XSS attack by sending a malicious link to a user and enticing the user to click it.
Clients with internet-facing applications should update or apply the hotfix. Clients running their own infrastructure should consult their security teams. |
E22 |
Reflected Cross Site Script (XSS) vulnerability |
|
F22 |
Reflected Cross Site Request Forgery (CSRF) vulnerability |
This vulnerability may only be exploited by authenticated users with security administrator privileges. Clients should periodically review who they have granted elevated privileges to. |
We are not aware of any of our clients being compromised as a result of these vulnerabilities.
If you are a Pega Cloud client, your Pega Cloud® environments running the relevant Pega versions listed in the table below, are being proactively remediated by Pega. CM cases are being created for each of your environments which provides the schedule of when the hotfixes will be applied.
If you are a United States Pega Cloud for Government (PCFG) client, SR cases are being created which will provide the relevant hotfixes for you to apply to your PCFG environments. A system restart, by the Pega Cloud team, will then be required for the hotfixes to take effect.
If you are an on–premises client, please review the tables below to determine which hotfixes correspond to your Pegasystems installation. Once you have determined the appropriate hotfix IDs, please submit hotfix requests using My Support Portal. As always, be sure you have appropriate backups in place before applying the hotfixes. Note that a system restart will be required for the hotfixes to take effect.
Information regarding the availability of the hotfixes will be publicly posted on Pega Support Center on Monday, Aug 22, 2022. In order to give all Pega clients time to patch their on-premises systems, we request that clients not discuss this in public forums until after Aug 22.
As always, we recommend our clients review our Security Checklist regularly.
CVE Details
CVE Details |
D22 |
E22 |
F22 |
Software/Product |
Pega Platform |
Pega Platform |
Pega Platform |
Affected Version(s) |
From 8.5.4 to 8.7.3 |
From 7.3 to 8.7.3 |
From 8.3 to 8.7.3 |
CVE ID |
CVE-2022-35654 |
CVE-2022-35655 |
CVE-2022-35656 |
CVSS Rating |
6.1 |
6.1 |
6.8 |
Description |
Cross Site Script (XSS) vulnerability |
Reflected Cross Site Script (XSS) vulnerability |
Reflected Cross Site Request Forgery (CSRF) vulnerability |
Version |
D22 |
E22 |
F22 |
8.5.6 |
HFIX-83957 |
Follow guidance* |
Update to 8.6.5 or higher |
8.6.5 |
HFIX-83956 |
Follow guidance* |
HFIX-83958 |
8.7.3 |
HFIX-84023 |
Follow guidance* |
HFIX-84022 |
8.8 |
Fixed in release |
Follow guidance* |
Fixed in release |
These issue will be included as part of the product in the 8.6.6, 8.7.4, and 8.8 patch and minor releases.
*E22 Guidance:
As a best practice, you should update your Pega environment to the latest release to take advantage of the latest features, capabilities, and security and bug fixes. See Keeping current with Pega.
Local Change Solution:
All versions from 7.3 and higher need to review their allow-listed Data Pages and adjust based on the two scenarios below:
The activity pzGetDataPageJSON internally checks the allow-listed Data Pages that are specified in the HTML rule pyPublicDataPageWhiteList.
How to use the HTML rule pyPublicDataPageWhiteList
Use of the HTML rule pyPublicDataPageWhiteList depends on two conditional scenarios.
Scenario 1: If the application does not use pega.api.ui.actions.getDataPage() for any business use case
As the application developer, you can make the HTML rule pyPublicDataPageWhiteList empty. With this change, any calls to pega.api.ui.actions.getDataPage() or direct processing of the activity pzGetDataPageJSON will return an empty response.
Scenario 2: If the application uses either the activity pzGetDataPageJSON or the JavaScript API pega.api.ui.actions.getDataPage() for any business use case
Use non-parameterized Data Pages for these use cases and add only those data page names (each data page entry in newline) in the HTML rule pyPublicDataPageWhiteList. With this change, you are restricting only a few Data Pages that can be returned when using the Public JavaScript API. To specify the Data Page(s), use the following format: (each Data Page will be on a new line)
DataPage1
DataPage2
DataPage3
The HTML rule pyPublicDataPageWhiteList was introduced in the following Pega Platform versions:
-
Pega Platform version 7.3.1 (HFIX-54435)
-
Pega Platform version 7.4 (HFIX-54126)
-
If you are using Pega Platform version 8.1.x, the rule exists in Pega Platform version 8.1.6 and later patch releases.
-
If you are using Pega Platform version 8.2.x, the rule exists in Pega Platform version 8.2.3 and later patch releases.
-
Pega Platform version 8.2.1 (HFIX-63456)
-
If you are using Pega Platform version 8.3.x, the rule exists in Pega Platform version 8.3.1 and later patch releases.
-
If you are using Pega Platform 8.4.x and all later major releases and patch releases, the rule exists in these releases and in future releases.
If you do not see your version listed, you should follow the best practice of updating to the latest release to be able to apply the local change.