cve/2009/CVE-2009-2060.md

18 lines
823 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2009-2060](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2060)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
### POC
#### Reference
- https://bugzilla.mozilla.org/show_bug.cgi?id=479880
#### Github
No PoCs found on GitHub currently.