Advisory

Han Sahin, September 2014

Source code disclosure of Websense Triton JSP files via double quote character

Abstract

Websense Triton is affected by a source code disclosure vulnerability. By appending a double quote character after JSP URLs, Websense will return the source code of the JSP instead of executing the JSP. An attacker can use this issue to inspect parts of Websense's source code in order to gain more knowledge about Websense's internals.

Tested versions

This issue was discovered on Websense Triton v7.8.3 and Websense appliance modules V-Series v7.7. Other versions may be affected as well.

Fix

Websense released hotfix 02 for Websense Triton v7.8.4 in which this issue is fixed. More information about this hotfix can be found at the following location:
http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-02-for-Web-Security-Solutions

This issue is resolved in TRITON APX Version 8.0. More information about the fixed can be found at the following location:
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0

Introduction

Websense Data Security Suite contains three modules - Data Security Gateway, Data Discover, and Data Endpoint - that can help manage the risk of losing your data to malicious users or accidental misuse.

Websense Triton is affected by a source code disclosure vulnerability. An attacker can use this issue to inspect parts of Websense's source code in order to gain more knowledge about Websense's internals.

Details

By appending a double quote character after JSP URLs, Websense will return the source code of the JSP instead of executing the JSP. For example:
https://<target>:9443/triton/login/pages/certificateDone.jsp%22

Information disclosure vulnerabilities aid attackers trying to compromise the web application.

Work with us →