A cross-site scripting vulnerability in Forefront Threat Management Gateway MBE allows for redirection to malicious sites
This article has been archived. It is offered "as is" and will no longer be updated.
Consider the following scenario:
- You publish a Web site in Microsoft Forefront Threat Management Gateway Medium Business Edition (MBE).
- You configure standard forms-based authentication in the Web listener.
- A client user is tricked into accessing a malicious a URL that abuses a vulnerability.
In this scenario, if the URL includes some client-side code, the user can be redirected to a malicious site that poses as a Web site that is published in Threat Management Gateway MBE.
This problem occurs because Threat Management Gateway MBE's forms-based authentication filter does not correctly cleanse the input data that the filter receives from the user.
To resolve this problem, apply the hotfix rollup package that is described in the following Microsoft Knowledge Base article:
MS09-016: Description of the Forefront Threat Management Gateway MBE hotfix package: April 14, 2009
Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.
For more information about this vulnerability, visit the following Microsoft Web site:
For more information about software update terminology, click the following article number to view the article in the Microsoft Knowledge Base:
Description of the standard terminology that is used to describe Microsoft software updates
Article ID: 968076 - Last Review: 01/15/2015 19:44:27 - Revision: 1.0
Microsoft Forefront Threat Management Gateway, Medium Business Edition, Windows Essential Business Server 2008 Standard
- kbnosurvey kbarchive kbexpertiseinter kbsurveynew kbbug kbfix kbqfe KB968076