CVE-2009-0803

N/A Unknown
Published: March 04, 2009 Modified: April 23, 2026
View on NVD

Description

SmoothWall SmoothGuardian, as used in SmoothWall Firewall, NetworkGuardian, and SchoolGuardian 2008, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.kb.cert.org/vuls/id/435052
Source: cve@mitre.org
US Government Resource
http://www.kb.cert.org/vuls/id/MAPG-7M6SM7
Source: cve@mitre.org
US Government Resource
http://www.securityfocus.com/bid/33858
Source: cve@mitre.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/435052
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.kb.cert.org/vuls/id/MAPG-7M6SM7
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.securityfocus.com/bid/33858
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

6 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.2%
79th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

smoothwall