Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8x6x-39qq-q9mc

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

EPSS

Процентиль: 56%
0.00344
Низкий

Дефекты

CWE-287

Связанные уязвимости

nvd
больше 16 лет назад

src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

debian
больше 16 лет назад

src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.1 ...

EPSS

Процентиль: 56%
0.00344
Низкий

Дефекты

CWE-287