Vulnerability CVE-2015-2748


Published: 2015-03-26

Description:
Websense TRITON AP-WEB before 8.0.0 does not properly restrict access to files in explorer_wse/, which allows remote attackers to obtain sensitive information via a direct request to a (1) Web Security incident report or the (2) Explorer configuration (websense.ini) file.

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Websense -> Triton ap data 
Websense -> Triton ap email 
Websense -> Triton ap web 
Websense -> V-series appliances 

 References:
http://packetstormsecurity.com/files/130901/Websense-Explorer-Missing-Access-Control.html
http://seclists.org/fulldisclosure/2015/Mar/107
http://www.securityfocus.com/archive/1/534913/100/0/threaded
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
https://www.securify.nl/advisory/SFY20140909/missing_access_control_on_websense_explorer_web_folder.html

Copyright 2024, cxsecurity.com

 

Back to Top