Family: Firewalls --> Category: infos
Proxy accepts CONNECT requests Vulnerability Scan
Vulnerability Scan Summary
Acertains if we can use the remote web proxy against any port
Detailed Explanation for this Vulnerability Test
The proxy allows the users to perform
CONNECT requests like
This request give to the person who make it the ability
to have an interactive session.
This problem may allow attackers to go through your
firewall, by connecting to sensitive ports like 23 (telnet)
using your proxy, or it can allow internal users to bypass the firewall
rules and connect to ports they should not be allowed to.
In addition to that, your proxy may be used to perform attacks against
Solution: reconfigure your proxy so that it refuses CONNECT requests.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.