A cross-site scripting vulnerability in ISA Server 2006 allows for redirection to malicious sites
This article has been archived. It is offered "as is" and will no longer be updated.
Consider the following scenario:
- You publish a Web site in Microsoft Internet Security and Acceleration (ISA) Server 2006.
- You configure standard forms-based authentication in the Web listener.
- A client user is tricked into accessing a malicious a URL that abuses a vulnerability.
In this scenario, the user can be redirected to a malicious site that poses as a Web site that is published in ISA Server.
This problem occurs because ISA Server 2006's forms-based authentication filter does not correctly cleanse the input data that is received from the user.
To resolve this problem, apply the hotfix rollup package that is described in the following Microsoft Knowledge Base article:
MS09-016: Description of the ISA Server 2006 hotfix package: April 14, 2009
Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.
For more information about this vulnerability, visit the following Microsoft Web site:
For more information about software update terminology, click the following article number to view the article in the Microsoft Knowledge Base:
Description of the standard terminology that is used to describe Microsoft software updates
Article ID: 968077 - Last Review: 01/15/2015 19:44:39 - Revision: 2.0
- Microsoft Internet Security and Acceleration Server 2006 Enterprise Edition
- Microsoft Internet Security and Acceleration Server 2006 Standard Edition
- kbnosurvey kbarchive kbsurveynew kbbug kbfix kbqfe KB968077