Vulnerability Name:

CCN-8239

Published:2002-02-19
Updated:2002-02-19
Summary:Check Point FireWall-1 could allow a remote user to bypass firewall restrictions. If a remote attacker has access to a HTTP proxy server, the attacker can then connect to a restricted server using the "CONNECT" method.
Note: The firewall is vulnerable only if the firewall module has access on the restricted server and "CONNECT" is enabled.

Note: This vulnerability also affects CacheFlow CacheOS.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: BugTraq Mailing List, Tue Feb 19 2002 - 09:05:22 CST
CheckPoint FW1 HTTP Security Hole

Source: CCN
Type: BugTraq Mailing List, Mon Feb 18 2002 - 18:09:59 CST
UPDATE: [wcolburn@nmt.edu: SMTP relay through checkpoint firewall]

Source: CCN
Type: BugTraq Mailing List, Tue Feb 19 2002 - 16:19:50 CST
UPDATE: [wcolburn@nmt.edu: SMTP relay through checkpoint firewall]

Source: CCN
Type: BugTraq Mailing List, Tue Feb 19 2002 - 16:50:13 CST
Re: UPDATE: [wcolburn@nmt.edu: SMTP relay through checkpoint firewall]

Source: CCN
Type: US-CERT VU#150227
HTTP proxy default configurations allow arbitrary TCP connections

Source: CCN
Type: BID-4131
Multiple Vendor HTTP CONNECT TCP Tunnel Vulnerability

Source: CCN
Type: BID-4143
CacheFlow CacheOS HTTP CONNECT TCP Tunnel Vulnerability

Source: XF
Type: UNKNOWN
fw1-connect-bypass-restrictions(8239)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:checkpoint:firewall-1:4.1:sp5:*:*:*:*:*:*
  • OR cpe:/o:bluecoat:cacheos:4.0.14:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    checkpoint firewall-1 4.1 sp5
    bluecoat cacheos 4.0.14