src/net/http/http_transaction_winhttp.cc in Google Chrome prior to 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle malicious users to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
google chrome |
||
google chrome 0.2.149.29 |
||
google chrome 0.2.149.30 |
||
google chrome 0.2.152.1 |
||
google chrome 0.2.153.1 |
||
google chrome 0.3.154.0 |
||
google chrome 0.3.154.3 |
||
google chrome 0.4.154.18 |
||
google chrome 0.4.154.22 |
||
google chrome 0.4.154.31 |
||
google chrome 0.4.154.33 |
||
google chrome 1.0.154.36 |
||
google chrome 1.0.154.39 |
||
google chrome 1.0.154.42 |
||
google chrome 1.0.154.43 |
||
google chrome 1.0.154.46 |