Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xw48-x32w-4m9r

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

Ссылки

EPSS

Процентиль: 84%
0.02418
Низкий

Дефекты

CWE-287

Связанные уязвимости

ubuntu
около 16 лет назад

Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

redhat
около 16 лет назад

Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

nvd
около 16 лет назад

Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

debian
около 16 лет назад

Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMon ...

oracle-oval
около 16 лет назад

ELSA-2009-1095: firefox security update (CRITICAL)

EPSS

Процентиль: 84%
0.02418
Низкий

Дефекты

CWE-287