TUCoPS :: Web :: Apps :: wsweep~1.htm

Baltimore Technologies WEBSweeper 4.02 bypass malicious tags
COMMAND

    Baltimore's WEBSweeper Script filtering

SYSTEMS AFFECTED

    Baltimore Technologies WEBSweeper 4.02

PROBLEM

    Following  is  based  on  a  eDvice  Security  Services  Advisory.
    WEBsweeper  is  Baltimore   Technologies'  Web  Content   Security
    solution.   It  enables  customers  to  implement Content Security
    policies on Web, HTTP and passive FTP transfers.

    eDvice  recently  conducted  a  test  of  WEBSweeper's  ability to
    filter Scripts at  the gateway.   WEBSweeper includes the  ability
    to filter script from HTML code.

    WEBSweeper includes  some design  and implementation  flaws, which
    allow  an  attacker  to  bypass  restrictions  set  by the product
    administrator and introduce malicious code into an organization.

    eDvice  found  three  problems  with WEBSweeper's Script filtering
    mechanism:

    1) By  adding an  extra opening  angled bracket  before the SCRIPT
       tag,  the  tag  will  be  left  unmodified  by WEBSweeper.  The
       browser however, will execute the contained script.  Example:

        <<SCRIPT language="javascript">
        alert("This should have been filtered");
        </SCRIPT>

    2) The following crafted html code:

        <SC<SCRIPT language="javascript"> </SCRIPT>RIPT language="javascript">
        alert("This should have been filtered");
        </SCRIPT>

       will  be  transformed  by  the  WEBsweeper  filter to yield the
       following result:
        
        <SCRIPT language="javascript">
        alert("This should have been filtered");
        </SCRIPT>

    3) WEBSweeper  does not  recognize and  does not  filter scripting
       tags constructed using extended Unicode notation.

SOLUTION

    Nothing yet.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH