Plugin ID | 35 |
Plugin name | Proxy gopher support detection |
Plugin filename | Proxy gopher support detection.plugin |
Plugin filesize | 2504 bytes |
Plugin family | Firewalls |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2003/11/14 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.3 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.3 |
Plugin protocol | tcp |
Plugin port | 8080 |
Plugin procedure detection | open|send GET gopher://www.computec.ch:1234 HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/1. |
Plugin detection accuracy | 90 |
Plugin comment | This plugin was written with the ATK Attack Editor. |
Bug affected | Proxy servers allowing gopher communications |
Bug vulnerability class | Configuration |
Bug description | Gopher is an old protocol, similar to the today well-known http protocol. Some web proxies allow gopher connections and could be misused as anonymizer for attacks. |
Bug solution | Reconfigure the proxy server so that it only accepts real http requests. |
Bug fixing time | 15 minutes |
Bug exploit availability | Yes |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Low |
Bug popularity | 7 |
Bug simplicity | 8 |
Bug impact | 4 |
Bug risk | 5 |
Bug Nessus risk | Medium |
Bug check tools | Nessus is able to do the same check. |
Source CVE | CAN-2002-0371 |
Source Nessus ID | 11305 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |