Is IronPort.com capable of delivering exploits through cross-site scripting?Written by DPTuesday, 8 June 2010
UPDATE: this was fixed on June 9, very fast!
The answer is "YES". Security researcher nicknamed " Hexspirit", has submitted to the archive a cross-site scripting vulnerability on an IronPort.com SSL - and supposedly "secure" - support page. Even if the XSS attack vector gets executed only via a POST request, an attacker could still exploit this security issue to infect innocent users and Cisco IronPort's customers and partners with malware, adware and spyware.
IronPort.com (SSL page) XSS Mirror:
Screenshot:
Based on your own words, I would say practice what you preach:
"IronPort's web reputation filters are protecting users from known and unknown exploits (including adware, Trojans, systemmonitors, keyloggers, malicious/ tracking cookies, browser hijackers, browser helper objects and phishing attacks) delivered through cross-site scripting (XSS), cross-site request forgery, SQL injections or invisible iFrames."
References:
|