Описание
Apple Safari before 3.2.2 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
Ссылки
Уязвимые конфигурации
Конфигурация 1Версия до 3.2.2 (включая)
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
EPSS
Процентиль: 50%
0.00265
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-287
Связанные уязвимости
github
почти 4 года назад
Apple Safari before 3.2.2 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
EPSS
Процентиль: 50%
0.00265
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-287