WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions.
References
| Link | Resource |
|---|---|
| http://www.oliverkarow.de/research/WebWasherCONNECT.txt | Exploit Vendor Advisory |
| http://www.securityfocus.com/bid/12394 | Patch Vendor Advisory |
| http://secunia.com/advisories/14058 | Patch Vendor Advisory |
| http://securitytracker.com/id?1013036 | |
| http://marc.info/?l=bugtraq&m=110693045507245&w=2 | |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/19144 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-01-27 21:00
Updated : 2017-07-10 18:32
NVD link : CVE-2005-0316
Mitre link : CVE-2005-0316
JSON object : View
CWE
Products Affected
webwasher
- webwasher_classic


