Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.WEB_APPLICATION_SCANNING_114237
HistoryMar 25, 2024 - 12:00 a.m.

Open Proxy

2024-03-2500:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
open proxy
vulnerabilities
web applications
unauthorized traffic relay
user authentication
abuse
server

7.4 High

AI Score

Confidence

Low

Web applications often rely on proxy server to route requests to the right web service. An Open Proxy vulnerabilities occurs when a web server is configured to act as forward proxy, allowing anyone to use it to relay web traffic. This setup can may allow an attacker to use the proxy server to make requests to an external or internal server.\n\nThe corse issue arises because the proxy does not authenticate its users, thereby offering no control over who users the server’s resources or for what purpose.

No source data

7.4 High

AI Score

Confidence

Low