VID |
22377 |
Severity |
30 |
Port |
8080,9090 |
Protocol |
TCP |
Class |
Webproxy |
Detailed Description |
The WebWasher Classic, according to its banner, has an unauthorized access vulnerability via the CONNECT command. WebWasher Classic is a well known HTTP-URL/Popup/Script filtering proxy server. WebWasher Classic versions 2.2.1 and 3.3 running in server mode on Microsoft Windows operating systems and possibly other versions could allow a remote attacker to bypass intended access restrictions when sending a CONNECT request to the localhost from external systems. A remote attacker could exploit this flaw to connect to certain ports on a victim's system.
* Note: This check solely relied on the banner of WebWasher Classic server to assess this vulnerability, so this might be a false positive.
* References: http://www.oliverkarow.de/research/WebWasherCONNECT.txt http://marc.theaimsgroup.com/?l=bugtraq&m=110693045507245&w=2 http://secunia.com/advisories/14058 http://securitytracker.com/alerts/2005/Jan/1013036.html http://www.securiteam.com/windowsntfocus/5VP072KEUK.html
* Platforms Affected: WebWasher Classic 2.2.1 WebWasher Classic 3.3 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of WebWasher (3.4 or later), available from: http://download.cnet.com/Webwasher/3000-2144_4-10048781.html |
Related URL |
CVE-2005-0316 (CVE) |
Related URL |
12394 (SecurityFocus) |
Related URL |
19144 (ISS) |
|