[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-2213Date: (C)2012-04-28   (M)2024-03-28


Squid 3.1.9 allows remote attackers to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher is unable to provide a squid.conf file for a vulnerable system, and the observed behavior is consistent with a squid.conf file that was (perhaps inadvertently) designed to allow access based on a "req_header Host" acl regex that matches www.uol.com.br

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
http://archives.neohapsis.com/archives/bugtraq/2012-04/0117.html
http://archives.neohapsis.com/archives/bugtraq/2012-04/0131.html
http://archives.neohapsis.com/archives/bugtraq/2012-04/0146.html
http://archives.neohapsis.com/archives/bugtraq/2012-04/0140.html
http://archives.neohapsis.com/archives/bugtraq/2012-04/0163.html
http://archives.neohapsis.com/archives/bugtraq/2012-04/0165.html

CWE    1
CWE-264

© SecPod Technologies