Summary
This host has Safari browser installed and is prone to Web Script Execution vulnerabilities.
Impact
Successful exploitation will allow attacker to execute arbitrary web script in an https site's context and spoof an arbitrary https site by letting a browser obtain a valid certificate.
Impact Level: Application
Insight
- Error in processes a '3xx' HTTP CONNECT response before a successful SSL handshake, which can be exploited by modifying the CONNECT response to specify a 302 redirect to an arbitrary https web site.
- Error exists while the HTTP Host header to determine the context of a document provided in a '4xx' or '5xx' CONNECT response from a proxy server, which can be exploited by modifying this CONNECT response, aka an 'SSL tampering' attack.
- Error is caused when application does not require a cached certificate before displaying a lock icon for an https web site, while sending the browser a crafted '4xx' or '5xx' CONNECT response page for an https request sent through a proxy server.
- Detects http content in https web pages only when the top-level frame uses https. This can be exploited by modifying an http page to include an https iframe that references a script file on an http site, related to 'HTTP-Intended-but-HTTPS-Loadable (HPIHSL) pages.'
Affected
Safari version prior to 3.2.2 on Windows.
References
Severity
Classification
-
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Adobe Digital Edition Information Disclosure Vulnerability (Windows)
- Adobe Flash Player Multiple Security Bypass Vulnerabilities - 01 Feb14 (Windows)
- Apple Safari 'setInterval()' Address Bar Spoofing Vulnerability (Win)
- Adobe Reader Information Disclosure & Code Execution Vulnerabilities (Linux)
- Apple Safari Multiple Memory Corruption Vulnerabilities-01 Aug14 (Mac OS X)