Description
Finjan SurfinGate 6.0 and 7.0, when running in proxy mode, does not authenticate FHTTP commands on TCP port 3141, which allows remote attackers to use the finjan-parameter-type header to (1) restart the service, (2) use the getlastmsg command to view log information, or (3) use the online command to force a policy update from the database server.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by David Byrne · textremotelinux
https://www.exploit-db.com/exploits/23585
References (6)
Core 6
Core References
Exploit, Patch third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/10714
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=107522480913629&w=2
Exploit, Patch mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0929.html
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=107487999406339&w=2
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/9478
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/14934
Scores
EPSS
0.1043
EPSS Percentile
93.3%
Details
Status
published
Products (4)
finjan_software/surfingate
6.0
finjan_software/surfingate
6.0_1
finjan_software/surfingate
6.0_5
finjan_software/surfingate
7.0
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026