lix through 15.8.7 allows man-in-the-middle attackers to execute arbitrary code by modifying the HTTP client-server data stream so that the Location header is associated with attacker-controlled executable content in the postDownload field.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Lix | Lix_project | * | 15.8.7 (including) |