Posted on 07/18/2016 5:37:21 PM PDT by Utilizer
A remotely exploitable vulnerability in web application code, first discovered 15 years ago, has returned to haunt server admins who are being urged to take action immediately to avoid being hit.
Researchers from New Zealand point of sale software company Vend, Dominic Scheirlink, Richard Rowe, Morgan Pyne and Scott Geary, worked with Red Hat product security staffer Kurt Seifried to document the flaw, which they have nicknamed Httpoxy.
On vulnerable applications, the Httpoxy flaw is easily exploitable, the researchers said.
Attackers can proxy outgoing HTTP requests and direct the server to open outwards connections to arbitrary IP addresses and transport control protocol (TCP) ports.
The flaw also allows for denial of service attacks, by forcing vulnerable software to use a malicous proxy to tie up server resources.
(Excerpt) Read more at itnews.com.au ...
Ping...
You might be interested in this one...
...as well (I forgot to add).
Great link! I strongly recommend you start a thread about it, mate. I believe it warrants more exposure.
Cheers!
Even more, ShadowAce, our Linux listkeeper.
Apache:
1. Enable mod_headers (however done in the config)
2. RequestHeader unset Proxy early
https://www.apache.org/security/asf-httpoxy-response.txt
IIS:
appcmd set config /section:requestfiltering
/+requestlimits.headerLimits.[header='proxy',sizelimit='0']
https://support.microsoft.com/en-us/kb/3179800
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.