acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.
Weaknesses in this category are typically introduced during the configuration of the software.
Link | Tags |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621493 | issue tracking patch |
https://bugzilla.redhat.com/show_bug.cgi?id=694658 | issue tracking patch |
http://secunia.com/advisories/44274 | third party advisory |
http://openwall.com/lists/oss-security/2011/04/08/3 | third party advisory mailing list |
https://banu.com/cgit/tinyproxy/diff/?id=e8426f6662dc467bd1d827100481b95d9a4a23e4 | broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67256 | vdb entry |
https://banu.com/bugzilla/show_bug.cgi?id=90 | broken link |
http://www.debian.org/security/2011/dsa-2222 | third party advisory vendor advisory |
http://openwall.com/lists/oss-security/2011/04/07/9 | third party advisory mailing list |