Vulnerabilities > CVE-2011-1499 - Configuration vulnerability in multiple products

047910
CVSS 2.6 - LOW
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
high complexity
banu
debian
CWE-16
nessus

Summary

acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_B9281FB961B211E0B1CE0019D1A7ECE2.NASL
    descriptionWhen including a line to allow a network of IP addresses, the access to tinyproxy 56 is actually allowed for all IP addresses.
    last seen2020-06-01
    modified2020-06-02
    plugin id53347
    published2011-04-11
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/53347
    titleFreeBSD : tinyproxy -- ACL lists ineffective when range is configured (b9281fb9-61b2-11e0-b1ce-0019d1a7ece2)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the FreeBSD VuXML database :
    #
    # Copyright 2003-2018 Jacques Vidrine and contributors
    #
    # Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
    # HTML, PDF, PostScript, RTF and so forth) with or without modification,
    # are permitted provided that the following conditions are met:
    # 1. Redistributions of source code (VuXML) must retain the above
    #    copyright notice, this list of conditions and the following
    #    disclaimer as the first lines of this file unmodified.
    # 2. Redistributions in compiled form (transformed to other DTDs,
    #    published online in any format, converted to PDF, PostScript,
    #    RTF and other formats) must reproduce the above copyright
    #    notice, this list of conditions and the following disclaimer
    #    in the documentation and/or other materials provided with the
    #    distribution.
    # 
    # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
    # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
    # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
    # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
    # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
    # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(53347);
      script_version("1.7");
      script_cvs_date("Date: 2019/08/02 13:32:41");
    
      script_cve_id("CVE-2011-1499");
    
      script_name(english:"FreeBSD : tinyproxy -- ACL lists ineffective when range is configured (b9281fb9-61b2-11e0-b1ce-0019d1a7ece2)");
      script_summary(english:"Checks for updated package in pkg_info output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote FreeBSD host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "When including a line to allow a network of IP addresses, the access
    to tinyproxy 56 is actually allowed for all IP addresses."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://banu.com/bugzilla/show_bug.cgi?id=90"
      );
      # https://vuxml.freebsd.org/freebsd/b9281fb9-61b2-11e0-b1ce-0019d1a7ece2.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?11750616"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:tinyproxy");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2010/05/18");
      script_set_attribute(attribute:"patch_publication_date", value:"2011/04/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2011/04/11");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"FreeBSD Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("freebsd_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
    if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (pkg_test(save_report:TRUE, pkg:"tinyproxy<1.8.2_2,1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:pkg_report_get());
      else security_note(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-16225.NASL
    description - Update to upstream 1.83 - switch to using systemd macros in rpm - update to a PIE hardened build - update to use systemd Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-09-22
    plugin id70043
    published2013-09-22
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70043
    titleFedora 19 : tinyproxy-1.8.3-1.fc19 (2013-16225)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-16165.NASL
    description - Update to upstream 1.83 - switch to using systemd macros in rpm - update to a PIE hardened build - update to use systemd Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-09-23
    plugin id70052
    published2013-09-23
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70052
    titleFedora 20 : tinyproxy-1.8.3-1.fc20 (2013-16165)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2222.NASL
    descriptionChristoph Martin discovered that incorrect ACL processing in TinyProxy, a lightweight, non-caching, optionally anonymizing HTTP proxy, could lead to unintended network access rights. The oldstable distribution (lenny) is not affected.
    last seen2020-03-17
    modified2011-04-21
    plugin id53505
    published2011-04-21
    reporterThis script is Copyright (C) 2011-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/53505
    titleDebian DSA-2222-1 : tinyproxy - incorrect ACL processing

Seebug

bulletinFamilyexploit
descriptionBugtraq ID: 47715 CVE ID:CVE-2011-1499 Tinyproxy是一个小型的基于GPL的HTTP/SSL代理程序。 Tinyproxy在子网掩码生成实现上存在一个错误,当配置允许网络段时(如&quot;Allow 192.168.0.0/24&quot;相对与默认的&quot;Allow 127.0.0.1&quot;),会允许任意IP地址连接,使其成为一个开放代理。如果配置使用一个或多个使用IP段的Allow语句,就会发生这种情况。 Banu Systems Private Limited Tinyproxy 1.8.2 厂商解决方案 Tinyproxy 1.8.3已经修复此漏洞,建议用户下载使用: https://banu.com/tinyproxy/
idSSV:20524
last seen2017-11-19
modified2011-05-08
published2011-05-08
reporterRoot
titleTinyproxy 'conf.c'整数溢出安全绕过漏洞