Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-58hv-2vjm-27h5

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Opera, possibly before 9.25, uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

Opera, possibly before 9.25, uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

EPSS

Процентиль: 46%
0.00235
Низкий

Дефекты

CWE-287

Связанные уязвимости

nvd
больше 16 лет назад

Opera, possibly before 9.25, uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

EPSS

Процентиль: 46%
0.00235
Низкий

Дефекты

CWE-287