Check Point Reference: | CPAI-2015-1082 |
Date Published: | 6 Sep 2015 |
Severity: | Medium |
Last Updated: | Thursday 15 October, 2015 |
Source: | |
Industry Reference: | CVE-2009-1776 CVE-2009-1777 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | FormMail 1.92 and prior |
Vulnerability Description | FormMail is prone to an HTTP-response-splitting vulnerability and multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user, steal cookie-based authentication credentials, and influence how web content is served, cached, or interpreted. This could aid in various attacks that try to entice client users into a false sense of trust. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: SharePoint Enforcement Violation.
Attack Information: Matt Wright FormMail Multiple cross-site scripting (XSS) vulnerabilities