Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Denial of Service --> Category: attack

Proxy accepts CONNECT requests to itself Vulnerability Scan

Vulnerability Scan Summary
Connects back to the web proxy through itself

Detailed Explanation for this Vulnerability Test
The proxy allows the users to perform
repeated CONNECT requests to itself.

This allow anybody to saturate the proxy CPU, memory or
file descriptors.

** Note that if the proxy limits the number of connections
** from a single IP (e.g. acl maxconn with Squid), it is
** protected against saturation and you may ignore this alert.

Solution: reconfigure your proxy so that
it refuses CONNECT requests to itself.

Threat Level: Medium

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.