Vulnerability CVE-2009-0804


Published: 2009-03-04   Modified: 2012-02-13

Description:
Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:H/Au:N/C:C/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.4/10
6.9/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
None
None
Affected software
Ziproxy -> Ziproxy 

 References:
http://www.kb.cert.org/vuls/id/435052
http://www.securityfocus.com/bid/33858
http://www.kb.cert.org/vuls/id/MAPG-7N9GN8

Copyright 2024, cxsecurity.com

 

Back to Top