Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-5034

Опубликовано: 24 фев. 2007
Источник: redhat
EPSS Низкий

Описание

ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=297611elinks reveals POST data to HTTPS proxy

EPSS

Процентиль: 82%
0.01785
Низкий

Связанные уязвимости

ubuntu
почти 18 лет назад

ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https.

nvd
почти 18 лет назад

ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https.

debian
почти 18 лет назад

ELinks before 0.11.3, when sending a POST request for an https URL, ap ...

github
больше 3 лет назад

ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https.

oracle-oval
почти 18 лет назад

ELSA-2007-0933: Moderate: elinks security update (MODERATE)

EPSS

Процентиль: 82%
0.01785
Низкий