WebApp Sec mailing list archives

Paros 3.2.6 release - security fix


From: contact () parosproxy org
Date: 7 Oct 2005 14:19:29 -0000

Paros 3.2.6 is released.  This is a security fix.  All users are recommended to upgrade to this version.

The new verison is available at http://www.parosproxy.org.

Queries, bug reports and comments on Paros can be sent to [contact at parosproxy org]. Please feel free to send any 
comments to us!

[Installation]

If you have installed the old version after 3.2.4, you can directly install this new version.

If you are using version prior to 3.2.4, you should uninstall the old version first.

The default installation is changed to use the 64M VM. For large site testing, you may adjust it depending on your need
and the memory you have (eg 128M)


[introduction]

Paros is a man-in-the-middle proxy and application vulnerability scanner. It allows
users to intercept, modify and debug HTTP and HTTPS data on-the-fly between web
server and client browser. It also supports spidering, proxy-chaining, filtering
and application vulnerability scanning.


[License] - Clarified Artistic License (open source and GPL-compatible license)


[Details/new features]

3.2.6
=====

Fix
-       Fix a security problem that when hsqldb starts it listen to all interfaces and used default password.  Now 
restrict to localhost only to avoid public exposure as this exposes database content and may allow unexpected stored 
procedures to be run.  Thanks to the user reporting it.


Current thread: