CVE-2009-1836Improper Authentication in Mozilla Firefox

Severity
6.8MEDIUMNVD
EPSS
2.0%
top 16.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 12
Latest updateMay 2

Description

Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages3 packages

NVDmozilla/firefox3.0.10+90
NVDmozilla/seamonkey1.1.16+21
NVDmozilla/thunderbird2.0.0.19+66

Patches

🔴Vulnerability Details

2
GHSA
GHSA-xw48-x32w-4m9r: Mozilla Firefox before 32022-05-02
CVEList
CVE-2009-1836: Mozilla Firefox before 32009-06-12

💥Exploits & PoCs

1
Exploit-DB
WordPress MU < 2.7 - 'HOST' HTTP Header Cross-Site Scripting2009-03-10

📋Vendor Advisories

3
Ubuntu
Thunderbird vulnerabilities2009-06-25
Ubuntu
Firefox and Xulrunner vulnerabilities2009-06-12
Red Hat
Firefox SSL tampering via non-200 responses to proxy CONNECT requests2009-06-11

💬Community

1
Bugzilla
CVE-2009-1836 Firefox SSL tampering via non-200 responses to proxy CONNECT requests2009-06-01
CVE-2009-1836 — Improper Authentication in Mozilla | cvebase