header-logo
Suggest Exploit
vendor:
WebWasher Classic
by:
SecurityFocus
7.5
CVSS
HIGH
Weakness
287
CWE
Product Name: WebWasher Classic
Affected Version From: WebWasher Classic 3.3
Affected Version To: WebWasher Classic 2.2.1
Patch Exists: YES
Related CWE: N/A
CPE: a:webwasher:webwasher_classic
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

WebWasher Classic Remote Port Connectivity Weakness

It is reported that WebWasher Classic is prone to a weakness that may allow remote attackers to connect to arbitrary ports on a vulnerable computer. This weakness may be combined with other attacks to exploit latent vulnerabilities. An attacker can bypass access controls implemented by the application through this attack.

Mitigation:

Ensure that access controls are properly implemented and enforced.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/12394/info

It is reported that WebWasher Classic is prone to a weakness that may allow remote attackers to connect to arbitrary ports on a vulnerable computer.

This weakness may be combined with other attacks to exploit latent vulnerabilities. An attacker can bypass access controls implemented by the application through this attack.

WebWasher Classic 3.3 and 2.2.1 are reported prone to this weakness. Other versions may be affected as well. 

The following proof of concept is available:
1) Start a netcat listener on the WebWasher system:
netcat -L -p 99 -s 127.0.0.1 < hallo.txt
2) Connect to the WebWasher proxy port (default 8080/tcp)
3) Enter command "CONNECT 127.0.0.1:99 HTTP/1.0"

As a result, content of hallo.txt will appear.