5.4
CVSSv2

CVE-2009-0804

Published: 04/03/2009 Updated: 18/06/2009
CVSS v2 Base Score: 5.4 | Impact Score: 6.9 | Exploitability Score: 4.9
VMScore: 481
Vector: AV:N/AC:H/Au:N/C:C/I:N/A:N

Vulnerability Summary

Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote malicious users to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.

Vulnerable Product Search on Vulmon Subscribe to Product

ziproxy ziproxy 2.6.0

Vendor Advisories

Debian Bug report logs - #521051 CVE-2009-0804: HTTP Host Header Incorrect Relay Behavior Vulnerability Package: ziproxy; Maintainer for ziproxy is Marcos Talau <talau@userssourceforgenet>; Source for ziproxy is src:ziproxy (PTS, buildd, popcon) Reported by: Raphael Geissert <atomo64@gmailcom> Date: Tue, 24 Mar 20 ...