Bugtraq mailing list archives

RE: Websense Blocked Sites XSS


From: "Mr. P.Taylor" <petert () imagine-sw com>
Date: Fri, 5 Dec 2003 10:46:18 -0500

So what you're telling me is it's impossible to transfer
information between frames and forms? Hmmmm...
And you're right the blocked site is not in the list of
trusted web sites BUT the site that you are visiting to
see this blocked information is in the local-net and would
that not bypass all security settings in IE?

Conclusion: there IS a security impact

Peter Taylor
CSO Imagine Software Inc.

"...my beliefs don't require them to..."

-----Original Message-----
From: 3APA3A [mailto:3APA3A () SECURITY NNOV RU]
Sent: Friday, December 05, 2003 8:09 AM
To: Mr. P.Taylor
Cc: aleph1 () securityfocus com; bugtraq () securityfocus com
Subject: Re: Websense Blocked Sites XSS


Dear Mr. P.Taylor,

It  runs  error message in context of blocked site. Now lets try to find
out possible impacts:

1.  It's  possible  to  run  javascript  on  the user host in context of
blocked  site.  But  it's  most  likely  blocked  site is not in list of
trusted  web  sites  on user's host, so it's impossible to get something
different from running same script on another webpage.

2. It possible to steal cookie, submit some forms, etc, on blocked site.
But  site  is  blocked. So, it's impossible to steal something or submit
something to this site.

Conclusion: there is no security impact

Post  Conclusion: Guys, it's perfect you can find all these XSS/CSS bugs
in  John Doe's guest books, Read-Doc-from-CDRom servers, etc. But please
think  about  _security_  impact  before  submitting  this to _security_
related lists.

--Wednesday, December 3, 2003, 7:35:39 PM, you wrote to
dhubbard () websense com:


MPT> Websense Blocked Sites XSS

MPT> Risk: High

MPT> Product: Websense Enterprise v4.3.0 - v5.1 (Maybe others we only
MPT> tested this version)

MPT> Product URL: http://www.websense.com

MPT> Found By: PeterT - petert () imagine-sw com

MPT> Problem:
MPT> When Websense blocks a web site, it returns a web page to the browser
MPT> stating
MPT> that the site has been blocked. This error message contains
the URL which
MPT> was
MPT> requested. Websense does not do any validation or encoding
of the URL before
MPT> returning it in the error message. This allows an attacker
to supply a URL
MPT> that
MPT> contains script <JavaScript, ActiveX, VB). This script will
run in the
MPT> context
MPT> of a server in the trusted domain and combined with other IE
flaws can have
MPT> serious consequences.

MPT> We have marked this as a High risk because we believe that allowing
MPT> attackers
MPT> to run arbitrary programs on your desktop at will, is a
serious problem.


MPT> Proof of Concept:
MPT> A URL like
MPT> http://BlockedSite?<SCRIPT>alert('hello')</SCRIPT> will run script.

MPT> Resolution:
MPT> The vendor has come out with a patch. Notified on Nov 29, 2003.

MPT> Thanks to Websense for fixing this issue.

MPT> Disclaimer:
MPT> Standard disclaimer applies. The opinions expressed in this
advisory are
MPT> our own and not of any company. The information within this
advisory may
MPT> change without notice. Use of this information constitutes
acceptance for
MPT> use in an AS IS condition. There are no warranties with
regard to this
MPT> information. In no event shall the author be liable for any damages
MPT> whatsoever arising out of or in connection with the use or
spread of this
MPT> information. Any use of this information is at the user's own risk.



--
~/ZARAZA
Èáî ôàêòû åñòü ôàêòû, è èçëîæåíû îíè ëèøü äëÿ òîãî, ÷òîáû èõ
ïîíÿëè è â íèõ ïîâåðèëè. (Òâåí)




Current thread: