Various problems in Baltimore MailSweeper Script filtering

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Saturday 22 September 2001


Various problems in Baltimore MailSweeper Script filtering
===========================================================

Product Background
--------------------
MAILsweeper is a Content Security solution for the gateway that allows
businesses to implement policy for Internet e-mail.

Scope
------
edvice recently conducted a test of MailSweeper's ability to filter Scripts
from HTML e-mail. MailSweeper includes the option to detect and remove
JavaScript and VBScript from incoming HTML e-mail.

The Findings
-------------
Two vulnerabilities in MailSweeper allows an attacker to bypass restrictions
set by the product administrator and to introduce malicious code into the
organization.

Details
--------
1. MailSweeper does not intercept correctly HTML encoded characters that
replace the string "javascript" or "vbscript" within certain HTML tags. As a
result, it is possible to bypass MailSweeper's script filtering.

For example:

<A HREF="javascript:alert('This part should be filtered')">Click here</A>

Or:

<IMG SRC="javascript:alert('This part should be filtered')">

2. Similar problem to the one we reported on WebSweeper applies for
MailSweeper as well. The following crafted html code:

<<IMG SRC="javascript:alert('This part should be filtered')">

Will go undetected by MailSweeper.

Version Tested
---------------
Baltimore Technologies MailSweeper 4.2

Status
-------
Baltimore Technologies was notified on 21 August 2001.


Discovered by edvice on 15 August 2001.
http://www.edvicesecurity.com/vul30.htm
support@edvicesecurity.com


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux