The HTTP/2 protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1036741 | vdb entry |
http://www.securitytracker.com/id/1036742 | vdb entry |
https://tom.vg/papers/heist_blackhat2016.pdf | technical description |
http://www.securitytracker.com/id/1036745 | vdb entry |
http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/ | technical description |
http://www.securitytracker.com/id/1036744 | vdb entry |
http://www.securitytracker.com/id/1036743 | vdb entry |
http://www.securityfocus.com/bid/92773 | vdb entry |
http://www.securitytracker.com/id/1036746 | vdb entry |