|Title:||Proxy accepts POST requests|
The proxy allows the users to perform
POST requests like
Without any Content-length tag.
This request may give an attacker the ability
to have an interactive session.
This problem may allow attackers to go through your
firewall, by connecting to sensitive ports like 23 (telnet)
using your proxy, or it can allow internal users to bypass the firewall
rules and connect to ports they should not be allowed to.
In addition to that, your proxy may be used to perform attacks against
Solution: reconfigure your proxy so that only the users of the internal
network can use it, and so that it can not connect to dangerous
Risk factor : High
|Copyright||This script is Copyright (C) 1999 Renaud Deraison|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.