Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-1000107

Опубликовано: 10 дек. 2019
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

A flaw was found in the Inets application in Erlang version 22.1 and possibly earlier, where it follows RFC 3875 section 4.1.18 and does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable. This flaw allows remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request.

Отчет

Red Hat CloudFroms 5.10 ship affected Erlang package, however, CloudFroms uses it as a dependency for Ansible Tower and do not expose it anywhere in product. Furthermore, Ansible Tower does not pass environment variables to RabbitMQ or Erlang which makes it not affected. Red Hat OpenStack Platform ships the affected Erlang package, however it is only used as a dependency for RabbitMQ and is not exposed outside the management network. As this network is tightly-regulated to OpenStack administrators, the risk for abuse is significantly reduced.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5erlangNot affected
Red Hat Ansible Tower 3erlangNot affected
Red Hat OpenStack Platform 10 (Newton)erlangWill not fix
Red Hat OpenStack Platform 13 (Queens)erlangWill not fix
Red Hat OpenStack Platform 15 (Stein)erlangWill not fix
Red Hat OpenStack Platform 16 (Train)erlangWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1824460erlang: allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy serve

EPSS

Процентиль: 52%
0.00287
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 6 лет назад

inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

CVSS3: 6.1
nvd
около 6 лет назад

inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

CVSS3: 6.1
debian
около 6 лет назад

inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1 ...

CVSS3: 6.1
github
больше 3 лет назад

inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

EPSS

Процентиль: 52%
0.00287
Низкий

6.1 Medium

CVSS3