Secunia Security Advisory - A vulnerability has been reported in Juniper Networks Secure Access, which can be exploited by malicious people to bypass certain security restrictions.
53c1f5598564f17c42e58e0e9b4474639f89c44bc3c838bc1384ba8cdb6bdb28
----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability
intelligence source on the market.
Implement it through Secunia.
For more information visit:
http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com
----------------------------------------------------------------------
TITLE:
Juniper Networks Secure Access Web VPN Same Origin Policy Bypass
SECUNIA ADVISORY ID:
SA37786
VERIFY ADVISORY:
http://secunia.com/advisories/37786/
DESCRIPTION:
A vulnerability has been reported in Juniper Networks Secure Access,
which can be exploited by malicious people to bypass certain security
restrictions.
The vulnerability is caused due to the web-based VPN implementation
prepending the same domain to all opened websites. This can be
exploited to bypass a browser's same origin policy and e.g. access
cookies for normally restricted domains by tricking a user into
browsing to a malicious website via the VPN.
SOLUTION:
Disable content rewriting for untrusted web servers. Please see the
vendor's advisory for more information.
PROVIDED AND/OR DISCOVERED BY:
US-CERT credits Michal Zalewski and Mike Zusman for the original
report.
Additional vulnerability details provided by David Warren and Ryan
Giobbi of US-CERT.
ORIGINAL ADVISORY:
Juniper Networks:
http://kb.juniper.net/KB15799
https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2009-11-580&viewMode=view
US-CERT VU#261869:
http://www.kb.cert.org/vuls/id/261869
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------