Cisco Bug: CSCun36631 - EHN: URL Defang operation should account for DNS Spoofing
Jul 06, 2017
- Cisco Email Security Appliance
Known Affected Releases
Symptom: Links from some sites are able to be followed even though they were supposed to have been defanged. Conditions: - The domain owner has taken steps to ensure that typos in the URL before the domain name are accounted for (a valid DNS response to a URL similar to blockedwww.eharmony.com). - The URL ends with a slash character (/) such that the "BLOCKED" that is added to the end is added after the trailing slash (/).
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases