| |
Vulnerability CVE-2012-2632
Published: 2012-06-15
Description: |
SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session. |
Type:
CWE-Other
CVSS2 => (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
2.6/10 |
2.9/10 |
4.9/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
High |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
None |
Partial |
None |
References: |
http://www.seil.jp/support/security/a01232.html
http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059
http://jvn.jp/en/jp/JVN24646833/index.html
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|