Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-5388

Опубликовано: 18 июл. 2016
Источник: redhat
CVSS3: 3.5
CVSS2: 2.6
EPSS Высокий

Описание

Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

It was discovered that tomcat used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5tomcat5Under investigation
Red Hat JBoss Enterprise Application Platform 5jbossasWill not fix
Red Hat JBoss Enterprise Application Platform 6TomcatAffected
Red Hat JBoss Enterprise Web Server 1tomcatWill not fix
Red Hat JBoss Enterprise Web Server 2tomcat7Affected
Red Hat JBoss Enterprise Web Server 2tomcat8Affected
Red Hat JBoss Enterprise Web Server 3tomcat6Affected
Red Hat Enterprise Linux 6tomcat6FixedRHSA-2016:204510.10.2016
Red Hat Enterprise Linux 7tomcatFixedRHSA-2016:204610.10.2016
Red Hat JBoss Web Server 3.0FixedRHSA-2016:162417.08.2016

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1353809Tomcat: CGI sets environmental variable based on user supplied Proxy request header

EPSS

Процентиль: 99%
0.75024
Высокий

3.5 Low

CVSS3

2.6 Low

CVSS2

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 9 лет назад

Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
nvd
почти 9 лет назад

Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
debian
почти 9 лет назад

Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI S ...

suse-cvrf
почти 9 лет назад

Security update for tomcat6

CVSS3: 8.1
github
около 3 лет назад

Improper Access Control in Apache Tomcat

EPSS

Процентиль: 99%
0.75024
Высокий

3.5 Low

CVSS3

2.6 Low

CVSS2