|
Family: Denial of Service --> Category: attack
Proxy accepts CONNECT requests to itself Vulnerability Scan
Vulnerability Scan Summary Connects back to the web proxy through itself
Detailed Explanation for this Vulnerability Test
The proxy allows the users to perform
repeated CONNECT requests to itself.
This allow anybody to saturate the proxy CPU, memory or
file descriptors.
** Note that if the proxy limits the number of connections
** from a single IP (e.g. acl maxconn with Squid), it is
** protected against saturation and you may ignore this alert.
Solution: reconfigure your proxy so that
it refuses CONNECT requests to itself.
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|