First published: Wed Apr 20 2022(Updated: )
A URL redirection vulnerability in Skyhigh SWG in main releases 10.x prior to 10.2.9, 9.x prior to 9.2.20, 8.x prior to 8.2.27, and 7.x prior to 7.8.2.31, and controlled release 11.x prior to 11.1.3 allows a remote attacker to redirect a user to a malicious website controlled by the attacker. This is possible because SWG incorrectly creates a HTTP redirect response when a user clicks a carefully constructed URL. Following the redirect response, the new request is still filtered by the SWG policy.
Credit: psirt@mcafee.com trellixpsirt@trellix.com
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee Web Gateway | >=7.0.0<7.8.2.31 | |
McAfee Web Gateway | >=8.0.0<8.2.27 | |
McAfee Web Gateway | >=9.0.0<9.2.20 | |
McAfee Web Gateway | >=10.0.0<10.2.9 | |
McAfee Web Gateway | >=11.0.0<11.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1254 is a URL redirection vulnerability in Skyhigh SWG that allows a remote attacker to redirect a user to a malicious website.
Main releases 10.x prior to 10.2.9, 9.x prior to 9.2.20, 8.x prior to 8.2.27, and 7.x prior to 7.8.2.31, and controlled release 11.x prior to 11.1.3 of Skyhigh SWG are affected.
CVE-2022-1254 has a severity rating of 6.1, which is considered medium.
An attacker can exploit CVE-2022-1254 by redirecting a user to a malicious website controlled by the attacker.
To fix CVE-2022-1254, update Skyhigh SWG to the latest version, which is 10.2.9 for main releases, 9.2.20 for 9.x releases, 8.2.27 for 8.x releases, 7.8.2.31 for 7.x releases, and 11.1.3 for controlled releases.