Executive Summary
Summary | |
---|---|
Title | Intercepting proxy servers may incorrectly rely on HTTP headers to make connections |
Informations | |||
---|---|---|---|
Name | VU#435052 | First vendor Publication | 2009-02-23 |
Vendor | VU-CERT | Last vendor Modification | 2009-03-12 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:C/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5.4 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#435052Intercepting proxy servers may incorrectly rely on HTTP headers to make connectionsOverviewProxy servers running in interception mode ("transparent" proxies) that make connection decisions based on HTTP header values may be used by an attacker to relay connections.I. DescriptionHTTP Host Headers are defined in RFC 2616 and are often used to by web servers to allow multiple websites to share a single IP address.From RFC 2616:
GET /pub/WWW/ HTTP/1.1 Host: www.w3.org A client MUST include a Host header field in all HTTP/1.1 request messages . If the requested URI does not include an Internet host name for the service being requested, then the Host header field MUST be given with an empty value. An HTTP/1.1 proxy MUST ensure that any request message it forwards does contain an appropriate Host header field that identifies the service being requested by the proxy. All Internet-based HTTP/1.1 servers MUST respond with a 400 (Bad Request) status code to any HTTP/1.1 request message which lacks a Host header field. To successfully exploit this issue, an attacker would need to either convince a user to visit a web page with malicious active content or be able to load the active content in an otherwise trusted site. Note that this vulnerability appears to only affect proxy servers that run in transparent mode and browser same origin policies should prevent attackers from re-using authentication credentials (cookies, etc) to obtain further access. This issue does not apply to proxy servers running in reverse mode. More information about this issue can be found in the Socket Capable Browser Plugins Result In Transparent Proxy Abusepaper. II. ImpactAn attacker may be able to make full connections to any website or resource that the proxy can connect to. These sites may include internal resources such as intranet sites that would not usually be exposed to the Internet.III. SolutionUpdateWhen possible, administrators are recommended to obtain updated software. See the systems affected section of this document for a partial list of affected vendors. Until updates are able to be applied, the below workarounds will mitigate this vulnerability.
Workarounds for users
Although these workarounds will not address the underlying issue, vendors who distribute HTTP proxy servers are encouraged to implement them to mitigate future vulnerabilities.
Systems Affected
|
Original Source
Url : http://www.kb.cert.org/vuls/id/435052 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-04-20 | Name : FreeBSD Ports: ziproxy File : nvt/freebsd_ziproxy.nasl |
2009-03-26 | Name : Qbik WinGate HTTP Proxy Server Access Controls Bypass Vulnerability File : nvt/secpod_wingate_http_proxy_serv_acl_bypass_vuln.nasl |
2009-03-26 | Name : Ziproxy Security Bypass Vulnerability File : nvt/secpod_ziproxy_sec_bypass_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
52412 | Ziproxy Transparent Interception Mode HTTP Host Header Dependancy Media Acces... |
52411 | SmoothGuardian Transparent Interception Mode HTTP Host Header Dependancy Medi... |
52410 | WinGate Transparent Interception Mode HTTP Host Header Dependancy Media Acces... |
52409 | Squid Transparent Interception Mode HTTP Host Header Dependancy Media Access ... |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-05-01 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2016-1025.nasl - Type : ACT_GATHER_INFO |
2016-06-17 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20160531_squid34_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2016-06-08 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20160531_squid_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2016-06-01 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-1139.nasl - Type : ACT_GATHER_INFO |
2016-06-01 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2016-1140.nasl - Type : ACT_GATHER_INFO |
2016-06-01 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-1139.nasl - Type : ACT_GATHER_INFO |
2016-06-01 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2016-1140.nasl - Type : ACT_GATHER_INFO |
2016-05-31 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-1139.nasl - Type : ACT_GATHER_INFO |
2016-05-31 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-1140.nasl - Type : ACT_GATHER_INFO |
2013-09-28 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201309-22.nasl - Type : ACT_GATHER_INFO |
2009-04-16 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_872ae5be29c011debdeb0030843d3802.nasl - Type : ACT_GATHER_INFO |