- Description
- ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https.
- Source
- security@ubuntu.com
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
- nvd@nist.gov
- CWE-200
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:elinks:elinks:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FC9B3D24-93B5-4E3B-868E-B25CB51790C1",
"versionEndIncluding": "0.11.1"
},
{
"criteria": "cpe:2.3:a:elinks:elinks:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "33F2AF11-B4BA-4954-BEFE-1482F2A104CC",
"versionEndIncluding": "0.11.2"
}
],
"operator": "OR"
}
]
}
]