CRIME (SPDY) attack
Impact: Low
Description
The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a “CRIME” attack. MITRE
Recommendation
Disable SPDY compression or use an HTTP/2.0 profile.
References
- Wikipedia: CRIME
- Wikipedia: Man-in-the-middle attack
- CWE-310
- OWASP 2017-A3
- OWASP 2021-A2
- CVE-2012-4930
- OWASP 2017-A9
- OWASP 2021-A6
👉 You might also like:
CRIME (SSL/TLS) attack - CVE-2012-4929
The POODLE attack - CVE-2014-3566
Secure Renegotiation is not supported - CVE-2009-3555
BREACH attack - Vulnerability
Last updated on April 04, 2021