Bloxx Web Filtering before 5.0.14 does not properly interpret X-Forwarded-For headers during access-control and logging operations for HTTPS connection attempts, which allows remote attackers to bypass intended IP address and domain restrictions, and trigger misleading log entries, via a crafted header.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/722963 | US Government Resource |
http://www.kb.cert.org/vuls/id/MAPG-8R9LBY | US Government Resource |
http://www.securityfocus.com/bid/53715 | |
http://www.kb.cert.org/vuls/id/722963 | US Government Resource |
http://www.kb.cert.org/vuls/id/MAPG-8R9LBY | US Government Resource |
http://www.securityfocus.com/bid/53715 |
Configurations
History
21 Nov 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/722963 - US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/MAPG-8R9LBY - US Government Resource | |
References | () http://www.securityfocus.com/bid/53715 - |
Information
Published : 2012-06-09 00:55
Updated : 2024-11-21 01:39
NVD link : CVE-2012-2566
Mitre link : CVE-2012-2566
CVE.ORG link : CVE-2012-2566
JSON object : View
Products Affected
bloxx
- web_filtering
CWE
CWE-264
Permissions, Privileges, and Access Controls