CVE-2005-0316

WebWasher Classic <3.3 - SSRF

Title source: llm
STIX 2.1

Description

WebWasher Classic 2.2.1 and 3.3, when running in server mode, does not properly drop CONNECT requests to the localhost from external systems, which could allow remote attackers to bypass intended access restrictions.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Oliver Karow · textremotemultiple
https://www.exploit-db.com/exploits/25066

References (6)

Core 6
Core References
Patch, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/14058
Patch, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/12394
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=110693045507245&w=2
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/19144
Exploit, Vendor Advisory x_refsource_misc
http://www.oliverkarow.de/research/WebWasherCONNECT.txt
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1013036

Scores

EPSS 0.1391
EPSS Percentile 94.3%

Details

Status published
Products (2)
webwasher/webwasher_classic 2.2.1
webwasher/webwasher_classic 3.3
Published Jan 28, 2005
Tracked Since Feb 18, 2026