First published: Thu Aug 23 2012(Updated: )
The ISAPI Filter plug-in in Websense Enterprise, Websense Web Security, and Websense Web Filter 6.3.3 and earlier, when used in conjunction with a Microsoft ISA or Microsoft Forefront TMG server, allows remote attackers to bypass intended filtering and monitoring activities for web traffic via an HTTP Via header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pfSense | <=6.3.3 | |
pfSense | =6.3.0 | |
pfSense | =6.3.1 | |
Websense Web Security | =6.3.0 | |
Websense Web Security | =6.3.1 | |
Websense Web Security | =6.3.3 | |
Websense Web Filter | <=6.3.3 | |
Websense Web Filter | =6.3.0 | |
Websense Web Filter | =6.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-5144 has been classified with high severity due to its potential impact on web traffic filtering.
To mitigate CVE-2010-5144, update Websense Enterprise, Websense Web Security, or Websense Web Filter to version 6.3.4 or later.
CVE-2010-5144 affects Websense Enterprise, Websense Web Security, and Websense Web Filter versions 6.3.3 and earlier.
Yes, CVE-2010-5144 can be exploited remotely, allowing attackers to bypass web filtering and monitoring.
Currently, it is recommended to apply the security update for CVE-2010-5144 as the most effective workaround.