First published: Sat Apr 28 2012(Updated: )
** DISPUTED ** McAfee Web Gateway 7.0 allows remote attackers to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher did not provide configuration details for the vulnerable system, and the observed behavior might be consistent with a configuration that was (perhaps inadvertently) designed to allow access based on Host HTTP headers.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee Web Gateway | =7.0.0 | |
=7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-2212 is disputed due to a lack of reproducibility in testing.
To fix CVE-2012-2212, ensure that your McAfee Web Gateway 7.0 is configured to validate the Host HTTP header properly.
CVE-2012-2212 affects users of McAfee Web Gateway version 7.0.0.
CVE-2012-2212 is a vulnerability that allows attackers to bypass access controls via manipulation of the Host HTTP header.
Yes, CVE-2012-2212 can be exploited remotely by attackers targeting the affected McAfee Web Gateway.