Check Point Reference: | CPAI-2007-329 |
Date Published: | 29 Dec 2009 |
Severity: | High |
Last Updated: | Thursday 06 June, 2013 |
Source: | |
Industry Reference: | CVE-2007-2581 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Microsoft Windows SharePoint Services (WSS) is an add-on component of Windows Server. WSS is based on IIS and ASP.NET technologies, providing a basic portal infrastructure, collaborative editing of documents, document organization, and version control capabilities. SharePoint functionality is exposed as web parts, which are components which implement a certain functionality. The mentioned web parts are then composed into web pages, which are then hosted in the SharePoint portal. WSS is integrated in other Microsoft products such as the Office SharePoint Server. There exist a cross-site scripting vulnerability in Microsoft SharePoint. The flaw is due to lack of input validation when processing the URL request from client. The flaw may be exploited by malicious users to execute arbitrary HTML code on target user's web browser, within the context of a trusted web site. An attack targeting this vulnerability can result in the injection and execution of script code. If code execution is successful, the behavior of the target will depend on the intention of the attacker. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Microsoft Windows SharePoint services cross site scripting (MS07-059).