Websense TRITON Unauthorized File Disclosure

medium Nessus Plugin ID 83740

Synopsis

The application on the remote web server is affected by an unauthorized file disclosure vulnerability.

Description

The version of Websense TRITON running on the remote web server does not properly restrict access to files in the 'explorer_wse/' path. A remote attacker, by using a direct request to a Web Security incident report or the Explorer configuration (websense.ini) file, can thereby gain access to sensitive information.

Solution

Update to version 8.0.0.

See Also

http://www.nessus.org/u?7a11e40c

http://www.nessus.org/u?c46d757d

Plugin Details

Severity: Medium

ID: 83740

File Name: websense_triton_usc_explorer_disclosure.nasl

Version: 1.5

Type: remote

Family: CGI abuses

Published: 5/21/2015

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:websense:triton_unified_security_center

Required KB Items: installed_sw/Websense TRITON

Exploit Ease: No exploit is required

Patch Publication Date: 4/8/2015

Vulnerability Publication Date: 9/1/2014

Reference Information

CVE: CVE-2015-2748

BID: 73236, 73241