acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621493 | x_refsource_CONFIRM |
https://bugzilla.redhat.com/show_bug.cgi?id=694658 | x_refsource_CONFIRM |
http://secunia.com/advisories/44274 | third-party-advisory x_refsource_SECUNIA |
http://openwall.com/lists/oss-security/2011/04/08/3 | mailing-list x_refsource_MLIST |
https://banu.com/cgit/tinyproxy/diff/?id=e8426f6662dc467bd1d827100481b95d9a4a23e4 | x_refsource_CONFIRM |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67256 | vdb-entry x_refsource_XF |
https://banu.com/bugzilla/show_bug.cgi?id=90 | x_refsource_CONFIRM |
http://www.debian.org/security/2011/dsa-2222 | vendor-advisory x_refsource_DEBIAN |
http://openwall.com/lists/oss-security/2011/04/07/9 | mailing-list x_refsource_MLIST |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621493 | x_refsource_CONFIRM x_transferred |
https://bugzilla.redhat.com/show_bug.cgi?id=694658 | x_refsource_CONFIRM x_transferred |
http://secunia.com/advisories/44274 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://openwall.com/lists/oss-security/2011/04/08/3 | mailing-list x_refsource_MLIST x_transferred |
https://banu.com/cgit/tinyproxy/diff/?id=e8426f6662dc467bd1d827100481b95d9a4a23e4 | x_refsource_CONFIRM x_transferred |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67256 | vdb-entry x_refsource_XF x_transferred |
https://banu.com/bugzilla/show_bug.cgi?id=90 | x_refsource_CONFIRM x_transferred |
http://www.debian.org/security/2011/dsa-2222 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://openwall.com/lists/oss-security/2011/04/07/9 | mailing-list x_refsource_MLIST x_transferred |
acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 2.6 | LOW | AV:N/AC:H/Au:N/C:N/I:P/A:N |