CVE-2009-2060

src/net/http/http_transaction_winhttp.cc in Google Chrome before 1.0.154.53 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 52%
VendorProductVersion
googlechrome
𝑥
≤ 1.0.154.52
googlechrome
0.2.149.29
googlechrome
0.2.149.30
googlechrome
0.2.152.1
googlechrome
0.2.153.1
googlechrome
0.3.154.0
googlechrome
0.3.154.3
googlechrome
0.4.154.18
googlechrome
0.4.154.22
googlechrome
0.4.154.31
googlechrome
0.4.154.33
googlechrome
1.0.154.36
googlechrome
1.0.154.39
googlechrome
1.0.154.42
googlechrome
1.0.154.43
googlechrome
1.0.154.46
𝑥
= Vulnerable software versions