Vulnerability Name: | CCN-8239 | ||||||
Published: | 2002-02-19 | ||||||
Updated: | 2002-02-19 | ||||||
Summary: | Check Point FireWall-1 could allow a remote user to bypass firewall restrictions. If a remote attacker has access to a HTTP proxy server, the attacker can then connect to a restricted server using the "CONNECT" method. Note: The firewall is vulnerable only if the firewall module has access on the restricted server and "CONNECT" is enabled. Note: This vulnerability also affects CacheFlow CacheOS. | ||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||
CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||
Vulnerability Consequences: | Bypass Security | ||||||
References: | Source: CCN Type: BugTraq Mailing List, Tue Feb 19 2002 - 09:05:22 CST CheckPoint FW1 HTTP Security Hole Source: CCN Type: BugTraq Mailing List, Mon Feb 18 2002 - 18:09:59 CST UPDATE: [wcolburn@nmt.edu: SMTP relay through checkpoint firewall] Source: CCN Type: BugTraq Mailing List, Tue Feb 19 2002 - 16:19:50 CST UPDATE: [wcolburn@nmt.edu: SMTP relay through checkpoint firewall] Source: CCN Type: BugTraq Mailing List, Tue Feb 19 2002 - 16:50:13 CST Re: UPDATE: [wcolburn@nmt.edu: SMTP relay through checkpoint firewall] Source: CCN Type: US-CERT VU#150227 HTTP proxy default configurations allow arbitrary TCP connections Source: CCN Type: BID-4131 Multiple Vendor HTTP CONNECT TCP Tunnel Vulnerability Source: CCN Type: BID-4143 CacheFlow CacheOS HTTP CONNECT TCP Tunnel Vulnerability Source: XF Type: UNKNOWN fw1-connect-bypass-restrictions(8239) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |