Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5qmq-wqf9-chpc

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Opera, possibly before 9.25, processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.

Opera, possibly before 9.25, processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.

EPSS

Процентиль: 50%
0.00269
Низкий

Дефекты

CWE-287

Связанные уязвимости

nvd
больше 16 лет назад

Opera, possibly before 9.25, processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.

EPSS

Процентиль: 50%
0.00269
Низкий

Дефекты

CWE-287