Armorlogic Profense Web Application Firewall before 2.2.22, and 2.4.x before 2.4.4, does not properly implement the "positive model," which allows remote attackers to bypass certain protection mechanisms via a %0A (encoded newline), as demonstrated by a %0A in a cross-site scripting (XSS) attack URL.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://resources.enablesecurity.com/advisories/ES-20090500-profense.txt - | |
References | () http://www.securityfocus.com/archive/1/503649/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/35053 - | |
References | () http://www.webappsec.org/lists/websecurity/archive/2009-05/msg00040.html - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/50662 - |
Information
Published : 2009-05-21 14:30
Updated : 2024-11-21 01:02
NVD link : CVE-2009-1594
Mitre link : CVE-2009-1594
CVE.ORG link : CVE-2009-1594
JSON object : View
Products Affected
armorlogic
- profense_web_application_firewall
CWE
CWE-264
Permissions, Privileges, and Access Controls