First published: Wed Apr 01 2009(Updated: )
Blue Coat ProxySG, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Blue Coat ProxySG VA-10 | ||
Blue Coat ProxySG VA-15 | ||
BlueCoat ProxySG VA-20 | ||
Blue Coat ProxySG VA-5 | ||
Bluecoat ProxySG | ||
Blue Coat ProxySG SG210-10 | ||
Blue Coat ProxySG SG210-10 | ||
Bluecoat ProxySG | ||
Bluecoat ProxySG | ||
Blue Coat ProxySG SG210-5 | ||
Blue Coat ProxySG SG210-5 | ||
Blue Coat ProxySG SG510-10 | ||
Blue Coat ProxySG SG510-10 | ||
Blue Coat ProxySG SG510-20 | ||
Blue Coat ProxySG SG510-20 | ||
Bluecoat ProxySG | ||
Bluecoat ProxySG | ||
Blue Coat ProxySG SG510-5 | ||
bluecoat ProxySG sg810-10 | ||
bluecoat ProxySG sg810-10 | ||
Blue Coat ProxySG SG810-20 | ||
Blue Coat ProxySG SG810-20 | ||
Blue Coat ProxySG SG810-25 | ||
Blue Coat ProxySG SG810-25 | ||
Blue Coat ProxySG SG810-5 | ||
Blue Coat ProxySG SG9000-10 | ||
Blue Coat ProxySG SG9000-10 | ||
Blue Coat ProxySG SG9000-20 | ||
Blue Coat ProxySG SG9000-20 | ||
Blue Coat ProxySG SG9000-5 | ||
Blue Coat ProxySG SG9000-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1211 has a medium severity rating, mainly due to its potential for unauthorized access.
To fix CVE-2009-1211, you should disable transparent interception mode on affected Blue Coat ProxySG devices.
CVE-2009-1211 affects multiple versions, including ProxySG VA-5, VA-10, VA-15, VA-20, SG210, SG510, SG810, and SG9000 series devices.
CVE-2009-1211 can be exploited to bypass access controls for technologies like Flash, Java, and Silverlight.
While CVE-2009-1211 was identified over a decade ago, it may still pose risks for organizations using outdated configurations of affected devices.