Description
A URL redirection vulnerability in Skyhigh SWG in main releases 10.x prior to 10.2.9, 9.x prior to 9.2.20, 8.x prior to 8.2.27, and 7.x prior to 7.8.2.31, and controlled release 11.x prior to 11.1.3 allows a remote attacker to redirect a user to a malicious website controlled by the attacker. This is possible because SWG incorrectly creates a HTTP redirect response when a user clicks a carefully constructed URL. Following the redirect response, the new request is still filtered by the SWG policy.
Published: 2022-04-20
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-24587 A URL redirection vulnerability in Skyhigh SWG in main releases 10.x prior to 10.2.9, 9.x prior to 9.2.20, 8.x prior to 8.2.27, and 7.x prior to 7.8.2.31, and controlled release 11.x prior to 11.1.3 allows a remote attacker to redirect a user to a malicious website controlled by the attacker. This is possible because SWG incorrectly creates a HTTP redirect response when a user clicks a carefully constructed URL. Following the redirect response, the new request is still filtered by the SWG policy.
History

No history.

Subscriptions

Mcafee Web Gateway
cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published:

Updated: 2024-08-02T23:55:24.561Z

Reserved: 2022-04-06T00:00:00.000Z

Link: CVE-2022-1254

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-20T13:15:07.507

Modified: 2024-11-21T06:40:21.033

Link: CVE-2022-1254

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses