Websense Triton 7.7.3 < 7.7.3 Hotfix 31 Information Disclosure

low Nessus Plugin ID 73520

Synopsis

The remote web server contains a web application that is affected by an information disclosure vulnerability.

Description

The remote application is running Websense Triton Unified Security Center, a component of the commercial suite of web filtering products.

The remote instance of Websense Triton Unified Security Center fails to sanitize user-supplied input data in the 'Log Database' and 'User Directories' areas of the 'Settings' component. This error could allow an authenticated attacker to obtain credential information belonging to other users and possibly those owning higher privileges.

Solution

There are no known workarounds or upgrades to correct this issue.
Websense has released the following Hotfixes to address this vulnerability :

- Web Security Gateway Anywhere v7.7.3 Hotfix 31
- Web Security Gateway v7.7.3 Hotfix 31
- Websense Web Security v7.7.3 Hotfix 31
- Websense Web Filter v7.7.3 Hotfix 31

See Also

http://www.nessus.org/u?2cccef1f

Plugin Details

Severity: Low

ID: 73520

File Name: websense_triton_usc_7_7_3_hf31.nasl

Version: 1.2

Type: local

Agent: windows

Family: Windows

Published: 4/15/2014

Updated: 8/6/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.3

CVSS v2

Risk Factor: Low

Base Score: 3.5

Temporal Score: 2.6

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:websense:triton_web_security, cpe:/a:websense:triton_web_filter

Required KB Items: Settings/ParanoidReport, SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Patch Publication Date: 3/21/2014

Vulnerability Publication Date: 4/7/2014

Reference Information

CVE: CVE-2014-0347

BID: 66687

CERT: 568252