Описание
Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.
It was discovered that tomcat used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | tomcat5 | Under investigation | ||
Red Hat JBoss Enterprise Application Platform 5 | jbossas | Will not fix | ||
Red Hat JBoss Enterprise Application Platform 6 | Tomcat | Affected | ||
Red Hat JBoss Enterprise Web Server 1 | tomcat | Will not fix | ||
Red Hat JBoss Enterprise Web Server 2 | tomcat7 | Affected | ||
Red Hat JBoss Enterprise Web Server 2 | tomcat8 | Affected | ||
Red Hat JBoss Enterprise Web Server 3 | tomcat6 | Affected | ||
Red Hat Enterprise Linux 6 | tomcat6 | Fixed | RHSA-2016:2045 | 10.10.2016 |
Red Hat Enterprise Linux 7 | tomcat | Fixed | RHSA-2016:2046 | 10.10.2016 |
Red Hat JBoss Web Server 3.0 | Fixed | RHSA-2016:1624 | 17.08.2016 |
Показывать по
Дополнительная информация
Статус:
EPSS
3.5 Low
CVSS3
2.6 Low
CVSS2
Связанные уязвимости
Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.
Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.
Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI S ...
EPSS
3.5 Low
CVSS3
2.6 Low
CVSS2