Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:31830
HistoryMar 21, 2015 - 12:00 a.m.

Source code disclosure of Websense Triton JSP files via double quote character

2015-03-2100:00:00
vulners.com
18

Source code disclosure of Websense Triton JSP files via double quote
character

Han Sahin, September 2014


Abstract

Websense Triton is affected by a source code disclosure vulnerability.
By appending a double quote character after JSP URLs, Websense will
return the source code of the JSP instead of executing the JSP. An
attacker can use this issue to inspect parts of Websense's source code
in order to gain more knowledge about Websense's internals.


Tested versions

This issue was discovered on Websense Triton v7.8.3 and Websense
appliance modules V-Series v7.7. Other versions may be affected as well.


Fix

Websense released hotfix 02 for Websense Triton v7.8.4 in which this
issue is fixed. More information about this hotfix can be found at the
following location:
http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-02-for-Web-Security-Solutions

This issue is resolved in TRITON APX Version 8.0. More information about
the fixed can be found at the following location:
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0


Details

httpa://www.securify.nl/advisory/SFY20140907/source_code_disclosure_of_websense_triton_jsp_files_via_double_quote_character.html