Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-5385

Опубликовано: 18 июл. 2016
Источник: redhat
CVSS3: 5
CVSS2: 5

Описание

PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.

It was discovered that PHP did not properly protect against the HTTP_PROXY variable name clash. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a PHP script to an attacker-controlled proxy via a malicious HTTP request.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpWill not fix
Red Hat Enterprise Linux 5php53Will not fix
Red Hat Enterprise Linux 6phpFixedRHSA-2016:160911.08.2016
Red Hat Enterprise Linux 7phpFixedRHSA-2016:161311.08.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6php54-phpFixedRHSA-2016:161011.08.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6php55-phpFixedRHSA-2016:161111.08.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-php56-phpFixedRHSA-2016:161211.08.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUSphp54-phpFixedRHSA-2016:161011.08.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUSphp55-phpFixedRHSA-2016:161111.08.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUSrh-php56-phpFixedRHSA-2016:161211.08.2016

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1353794PHP: sets environmental variable based on user supplied Proxy request header

5 Medium

CVSS3

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 9 лет назад

PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.

CVSS3: 8.1
nvd
почти 9 лет назад

PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.

CVSS3: 8.1
debian
почти 9 лет назад

PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 ...

oracle-oval
почти 9 лет назад

ELSA-2016-1613: php security and bug fix update (MODERATE)

oracle-oval
почти 9 лет назад

ELSA-2016-1609: php security update (MODERATE)

5 Medium

CVSS3

5 Medium

CVSS2