Vulnerability Note VU#318779
Websense Content Gateway XSS vulnerabilities
Websense Content Gateway contains XSS vulnerabilities.
Websense Content Gateway contains the following post-authentication reflective XSS vulnerabilities within the menu and item parameter values in the /monitor/m_overview.ink webpage. The reflective XSS reported allows for information disclosure and arbitrary code execution that can lead to the compromise of the Websense administrator’s account, machine, or other sensitive information.
An attacker with access to the Websense Content Gateway web interface or by tricking a logged in admin user to visit a specially crafted URL, a remote attacker can conduct a cross-site scripting attack, which could be used to result in information leakage, privilege escalation, and/or denial of service.
The vendor has reported that this vulnerability will be in addressed in version 7.7.3 which is scheduled to be released in December 2012.
Good security practices should be adopted to minimize the risk of compromise. Where possible, the administrator’s machine should be solely used for administration and segregated from Internet surfing, only whitelisted applications should be allowed to load from the administrator’s machine and the administrator should refrain from re-using the same login credentials for any other purposes.
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|WebSense||Unknown||25 Jun 2012||25 Jun 2012|
CVSS Metrics (Learn More)
Thanks to Steven Sim Kok Leong for reporting this vulnerability.
This document was written by Michael Orlando.
- CVE IDs: CVE-2012-2984
- Date Public: 23 Aug 2012
- Date First Published: 23 Aug 2012
- Date Last Updated: 27 Aug 2012
- Document Revision: 12
If you have feedback, comments, or additional information about this vulnerability, please send us email.