|
Family: Firewalls --> Category: infos
Proxy accepts gopher:// requests Vulnerability Scan
Vulnerability Scan Summary Acertains if we can use the remote web proxy to do gopher requests
Detailed Explanation for this Vulnerability Test
The proxy accepts gopher:// requests.
Gopher is an old network protocol which predates HTTP and
is nearly unused today. As a result, gopher-compatible
software is generally less audited and more likely to contain
security bugs than others.
By making gopher requests, a possible hacker may evade your firewall
settings, by making connections to port 70, or may even exploit
arcane flaws in this protocol to gain more rights on this
host (see the attached CVE id for such an example).
Solution : reconfigure your proxy so that it refuses gopher requests.
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|