Overview
Websense Content Gateway contains XSS vulnerabilities.
Description
Websense Content Gateway contains the following post-authentication reflective XSS vulnerabilities within the menu and item parameter values in the /monitor/m_overview.ink webpage. The reflective XSS reported allows for information disclosure and arbitrary code execution that can lead to the compromise of the Websense administrator’s account, machine, or other sensitive information.
|
Impact
An attacker with access to the Websense Content Gateway web interface or by tricking a logged in admin user to visit a specially crafted URL, a remote attacker can conduct a cross-site scripting attack, which could be used to result in information leakage, privilege escalation, and/or denial of service. |
Solution
The vendor has reported that this vulnerability will be in addressed in version 7.7.3 which is scheduled to be released in December 2012. |
Good security practices should be adopted to minimize the risk of compromise. Where possible, the administrator’s machine should be solely used for administration and segregated from Internet surfing, only whitelisted applications should be allowed to load from the administrator’s machine and the administrator should refrain from re-using the same login credentials for any other purposes. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 4.9 | AV:N/AC:M/Au:S/C:P/I:P/A:N |
Temporal | 4 | E:POC/RL:U/RC:UC |
Environmental | 1.1 | CDP:L/TD:L/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Steven Sim Kok Leong for reporting this vulnerability.
This document was written by Michael Orlando.
Other Information
CVE IDs: | CVE-2012-2984 |
Date Public: | 2012-08-23 |
Date First Published: | 2012-08-23 |
Date Last Updated: | 2012-08-27 11:53 UTC |
Document Revision: | 13 |