CVE-2009-0804

EUVD-2009-0802
Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.4 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:C/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 56%
Affected Products (NVD)
VendorProductVersion
ziproxyziproxy
2.6.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ziproxy
bookworm
3.3.2-6
fixed
bullseye
3.3.1-2.2
fixed
lenny
no-dsa
sid
3.3.2-7
fixed
trixie
3.3.2-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ziproxy
dapper
dne
gutsy
dne
hardy
dne
intrepid
ignored
jaunty
ignored
karmic
ignored
lucid
not-affected
maverick
not-affected
natty
not-affected
Common Weakness Enumeration