Mozilla Firefox before 3.0.10 processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://research.microsoft.com/apps/pubs/default.aspx?id=79323 - | |
References | () http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf - Exploit | |
References | () http://www.securityfocus.com/bid/35412 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/51203 - |
Information
Published : 2009-06-15 19:30
Updated : 2024-11-21 01:04
NVD link : CVE-2009-2061
Mitre link : CVE-2009-2061
CVE.ORG link : CVE-2009-2061
JSON object : View
Products Affected
mozilla
- firefox
CWE
CWE-310
Cryptographic Issues