Quantcast
Channel: Forcepoint Community
Viewing all articles
Browse latest Browse all 2011

apache daemon vulnerable in triton 7.7.3

$
0
0

The Triton management interface ( 7.7.3 on windows 2008 R2)  runs a vulnerable apache daemon, in which for example the HTTPonly cookie can be read by javascript by an error in the "400 BAD REQUEST" message.
Used in combination with XSS the security provided by the httponly cookie can be circumvented, possibly leading to mis-use of the cookie

<<picture available>>

RFE: please use a newer version of apache for Triton ( at least 2.2.22 or higher )
Internal reference: M05


Viewing all articles
Browse latest Browse all 2011

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>