Short Name |
HTTP:STC:JAVA:BEAST-WEBSOCKET |
---|---|
Severity |
High |
Recommended |
No |
Category |
HTTP |
Keywords |
Beast WebSocket Initialization |
Release Date |
2011/09/26 |
Update Number |
1999 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects the initialization of the WebSocket protocol which may be an indication of an attack. This protocol has been used in a variety of man in the middle exploitation's involving the SSL protocol and also a key component in the BEAST TLS/SSL exploitation tool. An attacker who exploits this vulnerability could gain access to a victim's sensitive information. This signature could trigger false positives if legitimate uses of the WebSocket protocol is used.
Multiple vendors' TLS protocol implementations are prone to a security vulnerability related to the session-renegotiation process. Successful exploits of this issue may allow attackers to perform limited man-in-the-middle attacks against vulnerable applications. Note that this issue does not allow attackers to decrypt encrypted data.