TUCoPS :: Security App Flaws :: atrap2.htm

Trend Micro Applet Trap 2.0 - attackers can bypass restrictions
COMMAND

    Applet Trap

SYSTEMS AFFECTED

    Trend Micro Applet Trap 2.0

PROBLEM

    Following is  based on  a eDvice  Security Advisory.   Trend Micro
    Applet  Trap  is  a  product  for blocking malicious Java applets,
    malicious  JavaScript  and  unsecured  ActiveX  controls  at   the
    gateway.  The product includes an option for URL filtering.

    eDvice  recently  conducted  a  test  of  AppletTrap's  ability to
    filter Scripts at  the gateway.   AppletTrap includes the  ability
    to  filter  script  languages  (JavaScript,  VBScript,  and/or all
    other HTML script languages) from HTML code.

    AppletTrap includes  some design  and implementation  flaws, which
    allow  an  attacker  to  bypass  restrictions  set  by the product
    administrator and introduce malicious code into an organization.

    dEvice  found  two  problems  with  AppletTrap's  Script filtering
    mechanism:

    1) If only JavaScript or VBScript (not both) filtering is enabled,
       then in  an html  page containing  a mixture  of JavaScript and
       VBScript code, AppletTrap will  not filter scripts that  should
       have been filtered  by policy as  long as these  scripts appear
       after a  script that  is allowed  by policy.   For example,  if
       the policy is set to  filter only VBScript and not  JavaScript,
       then in  a page  containing a  JavaScript and  a VBScript,  the
       VBScript will not  be filtered as  long as the  JavaScript code
       comes first.

    2) AppletTrap  does not  recognize and  does not  filter scripting
       tags constructed using extended Unicode notation.

SOLUTION

    Trend Micro has confirmed  these vulnerabilities and will  address
    them in version 2.5.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH