[NT] MIMESweeper For Web XSS
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 10 Jul 2006 18:01:18 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
MIMESweeper For Web XSS
MIMEsweeper for Web brings policy-based content security to the HTTP
gateway, where so many web-based threats enter and leave your company."
Improper handling of user input allows attackers to execute XSS and gain
* MIMESweeper For Web version 5
When accessing a URL which is not permitted the user is redirected to an
"access denied" page that is vulnerable to XSS. The page does not input
validate / HTML Encode the input and displays the data "as is".
Usually this means that it enables an attacker to inject HTML or
authentication cookies, change the appearance of web pages, perform
phishing ,and generally can do everything to the original page.
The vulnerability can be exploited by just redirecting the client to some
URL that is restricted by MIMESweeper policy and adding the script at the
end of the URL.
Proof of Concept:
Using the MIMESweeper capabilities of a central gateway to spread
malicious scripts to users.
An example attack scenario could be that an attacker will redirect many
users (by email, posting in the organization portal, etc.) to some blocked
URL and an accompanying script that will steal their authentication
Detection of this vulnerability involves injecting some HTML tags /
scripts to a blocked URL that will be responded by the MIMESweeper with
the vulnerable page.
Clearswift released a patch for this vulnerability, following the initial
The patch can be obtained from:
termed as "MIMEsweeper for Web 5.1.15 Hotfix"
27/06/06 Identification of the flaw
27/06/06 Reporting the flaw to clearswift by email
27/06/06 Response from clearswift, asking for more description
27/06/06 Providing the full description to clearswift
28/06/06 Clearswift acknowledge of the vulnerability
06/07/06 Patch released by clearswift
09/07/06 Public advisory
The information has been provided by <mailto:erezmetula@xxxxxxxxxxxxxx>
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [EXPL] SipXtapi SIP Buffer Overflow (Exploit)
- Next by Date: [NT] Microsoft WORD Hlink Local Buffer Overflow (Exploit)
- Previous by thread: [EXPL] SipXtapi SIP Buffer Overflow (Exploit)
- Next by thread: [NT] Microsoft WORD Hlink Local Buffer Overflow (Exploit)