src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an SSL tampering attack.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Chrome | * | 1.0.154.52 (including) | |
Chrome | 0.2.149.29 (including) | 0.2.149.29 (including) | |
Chrome | 0.2.149.30 (including) | 0.2.149.30 (including) | |
Chrome | 0.2.152.1 (including) | 0.2.152.1 (including) | |
Chrome | 0.2.153.1 (including) | 0.2.153.1 (including) | |
Chrome | 0.3.154.0 (including) | 0.3.154.0 (including) | |
Chrome | 0.3.154.3 (including) | 0.3.154.3 (including) | |
Chrome | 0.4.154.18 (including) | 0.4.154.18 (including) | |
Chrome | 0.4.154.22 (including) | 0.4.154.22 (including) | |
Chrome | 0.4.154.31 (including) | 0.4.154.31 (including) | |
Chrome | 0.4.154.33 (including) | 0.4.154.33 (including) | |
Chrome | 1.0.154.36 (including) | 1.0.154.36 (including) | |
Chrome | 1.0.154.39 (including) | 1.0.154.39 (including) | |
Chrome | 1.0.154.42 (including) | 1.0.154.42 (including) | |
Chrome | 1.0.154.43 (including) | 1.0.154.43 (including) | |
Chrome | 1.0.154.46 (including) | 1.0.154.46 (including) |