Description
The network diagnostics tool (CommandLineServlet) in the Appliance Manager command line utility (CLU) in Websense TRITON 7.8.3 and V-Series appliances before 7.8.4 Hotfix 02 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the "second" parameter of a command, as demonstrated by the Destination parameter in the ping command.
Exploits (1)
References (6)
Core 6
Core References
Exploit x_refsource_misc
https://www.securify.nl/advisory/SFY20140906/command_injection_vulnerability_in_network_diagnostics_tool_of_websense_appliance_manager.html
Exploit x_refsource_misc
http://packetstormsecurity.com/files/130899/Websense-Appliance-Manager-Command-Injection.html
Vendor Advisory x_refsource_confirm
http://www.websense.com/support/article/kbarticle/October-2014-Hotfix-Summary-for-Websense-Solutions
Mailing List mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/Mar/104
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/36423/
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/534910/100/0/threaded
Scores
EPSS
0.2389
EPSS Percentile
96.0%
Details
CWE
CWE-77
Status
published
Products (2)
websense/triton
7.8.3
websense/v-series_appliances
< 7.7
Published
Mar 26, 2015
Tracked Since
Feb 18, 2026