CVE-2009-2058

MEDIUM

Description

Apple Safari before 3.2.2 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

References

http://research.microsoft.com/apps/pubs/default.aspx?id=79323

http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf

https://exchange.xforce.ibmcloud.com/vulnerabilities/51193

Details

Source: MITRE

Published: 2009-06-15

Updated: 2017-08-17

Type: CWE-287

Risk Information

CVSS v2.0

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* versions up to 3.2.2 (inclusive)

Tenable Plugins

View all (1 total)

IDNameProductFamilySeverity
38745Safari < 3.2.3 Multiple VulnerabilitiesNessusWindows
high