Korean
<< Back
VID 22377
Severity 30
Port 8080,9090
Protocol TCP
Class Webproxy
Detailed Description The WebWasher Classic, according to its banner, has an unauthorized access vulnerability via the CONNECT command. WebWasher Classic is a well known HTTP-URL/Popup/Script filtering proxy server. WebWasher Classic versions 2.2.1 and 3.3 running in server mode on Microsoft Windows operating systems and possibly other versions could allow a remote attacker to bypass intended access restrictions when sending a CONNECT request to the localhost from external systems. A remote attacker could exploit this flaw to connect to certain ports on a victim's system.

* Note: This check solely relied on the banner of WebWasher Classic server to assess this vulnerability, so this might be a false positive.

* References:
http://www.oliverkarow.de/research/WebWasherCONNECT.txt
http://marc.theaimsgroup.com/?l=bugtraq&m=110693045507245&w=2
http://secunia.com/advisories/14058
http://securitytracker.com/alerts/2005/Jan/1013036.html
http://www.securiteam.com/windowsntfocus/5VP072KEUK.html

* Platforms Affected:
WebWasher Classic 2.2.1
WebWasher Classic 3.3
Microsoft Windows Any version
Recommendation Upgrade to the latest version of WebWasher (3.4 or later), available from:
http://download.cnet.com/Webwasher/3000-2144_4-10048781.html
Related URL CVE-2005-0316 (CVE)
Related URL 12394 (SecurityFocus)
Related URL 19144 (ISS)