#VU21163 Inconsistent interpretation of HTTP requests in CUJO Smart Firewall


Published: 2019-09-17

Vulnerability identifier: #VU21163

Vulnerability risk: High

CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:U/RC:C]

CVE-ID: CVE-2018-4030

CWE-ID: CWE-444

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
CUJO Smart Firewall
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor: CUJO AI

Description

The vulnerability allows a remote attacker to conduct an HTTP request smuggling attack on the target system.

The vulnerability exists due to the way the "safe browsing" function parses HTTP requests. A remote attacker can send a specially crafted HTTP request to the application, which incorrectly extracts the "Host" header from captured HTTP, allowing visit any malicious websites and bypass the firewall.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

CUJO Smart Firewall: 7003


External links
http://talosintelligence.com/vulnerability_reports/TALOS-2018-0702


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability