首页 > APT信息, 技术点滴 > Websense Triton 7.6 – unauthenticated remote command execution as SYSTEM

Websense Triton 7.6 – unauthenticated remote command execution as SYSTEM

2012年5月1日 baoz 阅读评论

这个漏洞给力,利用起来简单。权限还大,是system权限,估计跑websense的机器上面十有九有DC ADMIN的影子。你懂的。我打赌websense没有自动升级功能,我还打赌由于websense的重要角色,大家还不敢随便升级。所以这个时间窗口会很大,你懂的。转载开始。

 

. 11/02/2011 11:53 AM.. 07/14/2011 11:37 PM 2,529 batchchart.jar 07/14/2011 11:37 PM 3,819 body_components.css 07/14/2011 11:36 PM 3,776,598 cal_legend.exe 07/14/2011 11:37 PM 16,374 catcolors.txt …etc… As multiple instructions can be delivered in a single GET request it should be easy to launch this attack via CSRF, and because any internal user goes via the proxy the attack can be launched via any internal user clicking on the malicious link or visiting the attackers site with a crafted IMG tag. =============== Fix Information =============== This issue is addressed in Hotfix 24, which can be downloaded at: https://www.websense.com/content/mywebsense-hotfixes.aspx NGS Secure Research http://www.ngssecure.com 

  1. 本文目前尚无任何评论.