First published: Fri Sep 21 2007(Updated: )
ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Elinks Elinks | <=0.11.1 | |
Elinks Elinks | <=0.11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.