First published: Fri Jan 08 2016(Updated: )
Open redirect vulnerability in Blue Coat ProxySG 6.5 before 6.5.8.8 and 6.6 and Advanced Secure Gateway (ASG) 6.6 might allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a base64-encoded URL in conjunction with a "clear text" one in a coaching page, as demonstrated by "http://www.%humbug-URL%.local/bluecoat-splash-API?%BASE64-URL%."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bluecoat ProxySG | <=6.5.8.7 | |
Broadcom Symantec Advanced Secure Gateway | =6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8597 is considered a high severity vulnerability that allows open redirects leading to potential phishing attacks.
The recommended fix for CVE-2015-8597 is to upgrade Blue Coat ProxySG to version 6.5.8.8 or 6.6 or later.
CVE-2015-8597 affects Blue Coat ProxySG versions prior to 6.5.8.8 and Broadcom Symantec Advanced Secure Gateway version 6.6.
Yes, CVE-2015-8597 can be exploited remotely by attackers to redirect users to arbitrary websites.
The potential consequences of CVE-2015-8597 include unauthorized redirects and phishing, which can compromise user credentials and system security.