Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-5386

Опубликовано: 18 июл. 2016
Источник: redhat
CVSS3: 5
CVSS2: 5
EPSS Высокий

Описание

The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

An input-validation flaw was discovered in the Go programming language built in CGI implementation, which set the environment variable "HTTP_PROXY" using the incoming "Proxy" HTTP-request header. The environment variable "HTTP_PROXY" is used by numerous web clients, including Go's net/http package, to specify a proxy server to use for HTTP and, in some cases, HTTPS requests. This meant that when a CGI-based web application ran, an attacker could specify a proxy server which the application then used for subsequent outgoing requests, allowing a man-in-the-middle attack.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7compat-sap-c++-5Not affected
Red Hat Enterprise Linux 7gccNot affected
Red Hat Enterprise Linux 7gcc-librariesNot affected
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo) Operational ToolsgolangWill not fix
Red Hat OpenShift Enterprise 3golangAffected
Red Hat OpenStack Platform 8 (Liberty) Operational ToolsgolangWill not fix
Red Hat OpenStack Platform 9 (Mitaka) Operational ToolsgolangNot affected
Red Hat Enterprise Linux 7golangFixedRHSA-2016:153802.08.2016

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1353798Go: sets environmental variable based on user supplied Proxy request header

EPSS

Процентиль: 99%
0.87615
Высокий

5 Medium

CVSS3

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 9 лет назад

The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

CVSS3: 8.1
nvd
около 9 лет назад

The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

CVSS3: 8.1
debian
около 9 лет назад

The net/http package in Go through 1.6 does not attempt to address RFC ...

CVSS3: 8.1
github
больше 3 лет назад

The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

oracle-oval
около 9 лет назад

ELSA-2016-1538: golang security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 99%
0.87615
Высокий

5 Medium

CVSS3

5 Medium

CVSS2