DB4Web server, when configured to use verbose debug messages, allows remote attackers to use DB4Web as a proxy and attempt TCP connections to other systems (port scan) via a request for a URL that specifies the target IP address and port, which produces a connection status in the resulting error message.
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0125.html | vendor advisory broken link mailing list |
http://archives.neohapsis.com/archives/bugtraq/2002-09/0201.html | vendor advisory broken link mailing list |
http://www.iss.net/security_center/static/10136.php | vendor advisory broken link vdb entry exploit |
http://www.securityfocus.com/bid/5725 | patch vdb entry exploit vendor advisory broken link third party advisory |