Post Thu Oct 23, 2008 2:14 pm

HTTP Proxy CONNECT vulnerability

Would someone point me to an article describing exactly how to exploit this vulnerability?  I am working with a current Foundstome report which ranks its priority as high