Squid proxy was penetrated to reach protected hosts |
---|
Risk Level: | Medium | Check or Attack Name: squidprox |
---|---|---|
Platforms: | Squid | |
Description: | A firewall's squid HTTP proxy was used to connect to a URL inside the firewall. If this is allowed, an attacker can bypass certain firewall filters. |
|
Remedy: | Check your squid configuration. For more information, refer to your firewall's documentation. |
|
References: |
Know Your Risks |