---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Cisco ACE XML Gateway / Web Application Firewall Internal IP Address Disclosure SECUNIA ADVISORY ID: SA36879 VERIFY ADVISORY: http://secunia.com/advisories/36879/ DESCRIPTION: nitrĜus has reported a weakness in Cisco ACE XML Gateway and Cisco ACE Web Application Firewall, which can be exploited by malicious people to disclose certain system information. The weakness is caused due to error messages generated as responses to unsupported HTTP requests including a client's normally hidden, internal IP address. This can be exploited to disclose the IP address of e.g. an internal load balancer via e.g. an OPTIONS HTTP request. The weakness is reported in Cisco ACE XML Gateway and the Cisco ACE Web Application Firewall versions 6.0 and prior. SOLUTION: The weakness will reportedly be fixed in system software version 6.1, expected to be available in November 2009. Remove IP addresses from outgoing HTTP error messages by using a web proxy. PROVIDED AND/OR DISCOVERED BY: nitrĜus (Alejandro Hernandez H.), CubilFelino Security Research Lab ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sr-20090925-axg.shtml CubilFelino Security Research Lab: http://www.brainoverflow.org/advisories/cisco_ace_xml_gw_ip_disclosure.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------