CVE-2015-2748

Websense TRITON AP-WEB before 8.0.0 does not properly restrict access to files in explorer_wse/, which allows remote attackers to obtain sensitive information via a direct request to a (1) Web Security incident report or the (2) Explorer configuration (websense.ini) file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:websense:triton_ap_data:*:*:*:*:*:*:*:*
cpe:2.3:a:websense:triton_ap_email:*:*:*:*:*:*:*:*
cpe:2.3:a:websense:triton_ap_web:*:*:*:*:*:*:*:*
cpe:2.3:a:websense:v-series_appliances:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:27

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/130901/Websense-Explorer-Missing-Access-Control.html - Exploit () http://packetstormsecurity.com/files/130901/Websense-Explorer-Missing-Access-Control.html - Exploit
References () http://seclists.org/fulldisclosure/2015/Mar/107 - () http://seclists.org/fulldisclosure/2015/Mar/107 -
References () http://www.securityfocus.com/archive/1/534913/100/0/threaded - () http://www.securityfocus.com/archive/1/534913/100/0/threaded -
References () http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 - Vendor Advisory () http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 - Vendor Advisory
References () https://www.securify.nl/advisory/SFY20140909/missing_access_control_on_websense_explorer_web_folder.html - Exploit () https://www.securify.nl/advisory/SFY20140909/missing_access_control_on_websense_explorer_web_folder.html - Exploit

Information

Published : 2015-03-26 14:59

Updated : 2024-11-21 02:27


NVD link : CVE-2015-2748

Mitre link : CVE-2015-2748

CVE.ORG link : CVE-2015-2748


JSON object : View

Products Affected

websense

  • v-series_appliances
  • triton_ap_web
  • triton_ap_data
  • triton_ap_email
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor