src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an “SSL tampering” attack.
CPE | Name | Operator | Version |
---|---|---|---|
chrome | eq | 0.3.154.3 | |
chrome | eq | 0.2.149.30 | |
chrome | eq | 0.4.154.31 | |
chrome | eq | 1.0.154.39 | |
chrome | eq | 0.4.154.33 | |
chrome | eq | 1.0.154.43 | |
chrome | eq | 1.0.154.42 | |
chrome | eq | 0.4.154.18 | |
chrome | eq | 0.2.149.29 | |
chrome | eq | 0.2.152.1 |
research.microsoft.com/apps/pubs/default.aspx?id=79323
research.microsoft.com/pubs/79323/pbp-final-with-update.pdf
src.chromium.org/viewvc/chrome/branches/release_154.next/src/net/http/http_transaction_winhttp.cc?r1=11621&r2=11669&pathrev=11669
src.chromium.org/viewvc/chrome?view=rev&revision=11669
bugzilla.mozilla.org/show_bug.cgi?id=479880
code.google.com/p/chromium/issues/detail?id=7338
code.google.com/p/chromium/issues/detail?id=8473
exchange.xforce.ibmcloud.com/vulnerabilities/51194
sites.google.com/a/chromium.org/dev/getting-involved/dev-channel/release-notes/releasenotes1015453