Websense Content Gateway contains XSS vulnerabilities.
Websense Content Gateway contains the following post-authentication reflective XSS vulnerabilities within the menu and item parameter values in the /monitor/m_overview.ink webpage. The reflective XSS reported allows for information disclosure and arbitrary code execution that can lead to the compromise of the Websense administrator’s account, machine, or other sensitive information.
An attacker with access to the Websense Content Gateway web interface or by tricking a logged in admin user to visit a specially crafted URL, a remote attacker can conduct a cross-site scripting attack, which could be used to result in information leakage, privilege escalation, and/or denial of service.
The vendor has reported that this vulnerability will be in addressed in version 7.7.3 which is scheduled to be released in December 2012.
Good security practices should be adopted to minimize the risk of compromise. Where possible, the administrator’s machine should be solely used for administration and segregated from Internet surfing, only whitelisted applications should be allowed to load from the administrator’s machine and the administrator should refrain from re-using the same login credentials for any other purposes.
Thanks to Steven Sim Kok Leong for reporting this vulnerability.
|Date First Published:||2012-08-23|
|Date Last Updated:||2012-08-27 11:53 UTC|