source: https://www.securityfocus.com/bid/22787/info
Novell Access Management SSLVPN Server is prone to a security-bypass vulnerability.
A remote authenticated attacker can exploit this issue to access corporate resources normally restricted within VPN access policy. This may lead to other attacks.
This issue affects version 3 IR1 of Novell Access Management Server.
A proof-of-concept modification to 'policy.txt' would be as follows:
sslize {
from : 0.0.0.0 / 0
to :10.0.0.0/255.0.0.0
port : 80
protocol :tcp
action :allow
};
The above example demonstrates how an attacker would allow their client machine HTTP access to any host on the remote network.