Описание
src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2009-2060
- https://bugzilla.mozilla.org/show_bug.cgi?id=479880
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51194
- http://code.google.com/p/chromium/issues/detail?id=7338
- http://code.google.com/p/chromium/issues/detail?id=8473
- http://research.microsoft.com/apps/pubs/default.aspx?id=79323
- http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf
- http://sites.google.com/a/chromium.org/dev/getting-involved/dev-channel/release-notes/releasenotes1015453
- http://src.chromium.org/viewvc/chrome/branches/release_154.next/src/net/http/http_transaction_winhttp.cc?r1=11621&r2=11669&pathrev=11669
- http://src.chromium.org/viewvc/chrome?view=rev&revision=11669
Связанные уязвимости
src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.1 ...