We found results for “”
WS-2012-0019
Good to know:
Date: January 20, 2012
In php-src, php-5.3.1RC1 to php-5.4.0beta2 there is a vulnerability which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
Channel Accessible by Non-Endpoint
CWE-300Top Fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | LOW |
Availability (A): | NONE |