Check Point Reference: | CPAI-2011-076 |
Date Published: | 15 Mar 2011 |
Severity: | High |
Last Updated: | Tuesday 15 March, 2011 |
Source: | |
Industry Reference: | CVE-2010-3936 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Microsoft Forefront Unified Access Gateway (UAG) is designed to provide secure remote access to corporate resources for employees, partners and vendors from both managed and unmanaged PCs and mobile devices. UAG provides a variety of connection options including SSL VPN, Microsoft DirectAccess and IPSec as well as a centralized management of a single gateway solution. A cross-site scripting vulnerability has been reported in Microsoft Forefront Unified Access Gateway (UAG). The vulnerability is due to insufficient validation of user-supplied input in signurl.asp by the Microsoft Forefront UAG. A remote attacker can exploit this flaw by enticing a target to open a malicious URL link. Successful exploitation would result in compromise of web browser cookies (including authentication cookies) associated with the site, and modification of user information. |
This protection will detect and block malicious URL links attempting to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Security Products Enforcement Violation.
Attack Information: Microsoft Forefront UAG Signurl.asp cross-site scripting (MS10-089)