SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN24646833/index.html - | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059 - | |
References | () http://www.seil.jp/support/security/a01232.html - Vendor Advisory |
Information
Published : 2012-06-15 19:55
Updated : 2024-11-21 01:39
NVD link : CVE-2012-2632
Mitre link : CVE-2012-2632
CVE.ORG link : CVE-2012-2632
JSON object : View
Products Affected
seil
- x1
- x2
- x86_firmware
- b1
- b1_firmware
CWE