Files
cve/2009/CVE-2009-1836.md

18 lines
834 B
Markdown
Raw Permalink Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2009-1836](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1836)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
### POC
#### Reference
- https://bugzilla.mozilla.org/show_bug.cgi?id=479880
#### Github
No PoCs found on GitHub currently.