WebTitan Multiple Security Vulnerabilities

Summary
This host is running WebTitan and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to trivially gain privileged access to the device, execute arbitrary commands and gain access to arbitrary files. Impact Level: System/Application
Solution
Upgrade to WebTitan version 4.04 or later, For updates refer to http://www.webtitan.com
Insight
- The categories-x.php script not properly sanitizing user-supplied input to the 'sortkey' GET parameter. - Input passed via the 'fname' and 'logfile' parameters is not properly sanitized upon submission to logs-x.php. - Input passed via the 'ldapserver' parameter is not properly sanitized upon submission to the users-x.php script. - Input passed via the 'ntpserversList' POST parameter is not properly sanitized upon submission to the time-x.php script. - Input passed via the 'reportid' parameter is not properly sanitized upon submission to the schedulereports-x.php script. - Input passed via the 'delegated_admin' POST parameter is not properly sanitized upon submission to the reporting-x.php script. - The autoconf-x.php, contentfiltering-x.php, license-x.php, msgs.php, and reports-drill.php scripts not requiring authentication.
Affected
WebTitan version 4.01 (Build 68)
Detection
Send a crafted default credential via HTTP GET request and check whether it is able to get information or not.
References