链接:http://seclists.org/bugtraq/2013/Jan/14 https://community.rapid7.com/docs/DOC-2065#release5 *>测试方法: --------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负! Exploit steps for proof-of-concept: 1. Nexpose admin logs in. 2. While monitoring auth.log, the “Registered session” value is captured. 3. A request to the security console is made and intercepted using a proxy. 4. ‘JSESSIONID=<session>’ is replaced by ‘nexposeCCSessionID=<SESSION-CAPTURED-IN-STEP-2>;time-zone-offset=000. 5. Success.
Credit: Robert Gilbert HALOCK Security Labs建议: -------------------------------------------------------------------------------- 厂商补丁: