This vulnerability can be exploited remotely by uploading a malicious html file to the attacked system. Note that the attack vector for this vulnerability is through the restore backup function, so it is recommended for system administrators to carefully review the restore backup function. It appears that version 4.2.0 and below is vulnerable. This version might be outdated. Check if your version is vulnerable by visiting the following website: https://www.websense.com/risk/vulnerabilities/info/details?id=CVE-2018-10856
It is recommended that users upgrade their systems to the latest version of the application, or install a patch.
This vulnerability allows the attacker to upload a malicious html file which will execute shell commands on the attacked system. This vulnerability affects versions 4.2.0 and below of WebSense, so it is recommended for system administrators to review the restore backup function in their version and make sure they are not vulnerable.
How to Fix Websense Backup Software Vulnerability?
In order to fix the vulnerability, update your websense backup software to version 4.2.1 or newer. If you are unable to update your software, follow this workaround:
- Set registry key
- Upload malicious html file
- Restart the patched system
If you prefer a more permanent solution, consider disabling the vulnerable function in the registry.
Published on: 08/29/2022 23:15:00 UTC
Last modified on: 09/02/2022 19:01:00 UTC