WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions.
Link | Tags |
---|---|
http://secunia.com/advisories/14058 | third party advisory patch vendor advisory |
http://www.securityfocus.com/bid/12394 | vdb entry patch vendor advisory |
http://marc.info/?l=bugtraq&m=110693045507245&w=2 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19144 | vdb entry |
http://www.oliverkarow.de/research/WebWasherCONNECT.txt | exploit vendor advisory |
http://securitytracker.com/id?1013036 | vdb entry |