Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pqw6-9pgr-fr4x

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Apple Safari before 3.2.2 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

Apple Safari before 3.2.2 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

EPSS

Процентиль: 50%
0.00265
Низкий

Дефекты

CWE-287

Связанные уязвимости

nvd
больше 16 лет назад

Apple Safari before 3.2.2 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

EPSS

Процентиль: 50%
0.00265
Низкий

Дефекты

CWE-287