Secunia Security Advisory - mrhinkydink has reported a security issue in Websense, which can be exploited by malicious people to bypass certain security restrictions.
83416d25b32e70f2b9f5d98f3c25dfc2f56f9644fa255ddd519fe96bd5977eae
----------------------------------------------------------------------
2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.
Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv
----------------------------------------------------------------------
TITLE:
Websense User-Agent Filtering Bypass Security Issue
SECUNIA ADVISORY ID:
SA28026
VERIFY ADVISORY:
http://secunia.com/advisories/28026/
CRITICAL:
Less critical
IMPACT:
Security Bypass
WHERE:
>From local network
SOFTWARE:
Websense 6.x
http://secunia.com/product/8077/
DESCRIPTION:
mrhinkydink has reported a security issue in Websense, which can be
exploited by malicious people to bypass certain security
restrictions.
The security issue is caused due to the improper filtering of certain
HTTP requests. This can be exploited to bypass URL filtering rules and
gain access to restricted websites via specially crafted User-Agent
fields in outgoing HTTP headers.
The security issue is reported in version 6.3.1. Prior versions may
also be affected.
SOLUTION:
The vendor issued automatic updates that corrected the security
issue.
PROVIDED AND/OR DISCOVERED BY:
mrhinkydink
ORIGINAL ADVISORY:
mrhinkydink:
http://mrhinkydink.blogspot.com/2007/12/websense-policy-filtering-bypass.html
Websense:
http://www.websense.com/SupportPortal/SupportKbs/976.aspx
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------