Vulnerability Description
WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webwasher | Webwasher Classic | 2.2.1 |
References
- http://marc.info/?l=bugtraq&m=110693045507245&w=2
- http://secunia.com/advisories/14058PatchVendor Advisory
- http://securitytracker.com/id?1013036
- http://www.oliverkarow.de/research/WebWasherCONNECT.txtExploitVendor Advisory
- http://www.securityfocus.com/bid/12394PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19144
- http://marc.info/?l=bugtraq&m=110693045507245&w=2
- http://secunia.com/advisories/14058PatchVendor Advisory
- http://securitytracker.com/id?1013036
- http://www.oliverkarow.de/research/WebWasherCONNECT.txtExploitVendor Advisory
- http://www.securityfocus.com/bid/12394PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19144
FAQ
What is CVE-2005-0316?
CVE-2005-0316 is a vulnerability with a CVSS score of 7.5 (HIGH). WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended acce...
How severe is CVE-2005-0316?
CVE-2005-0316 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0316?
Check the references section above for vendor advisories and patch information. Affected products include: Webwasher Webwasher Classic.