Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-5387

Опубликовано: 19 июл. 2016
Источник: ubuntu
Приоритет: medium
EPSS Высокий
CVSS2: 6.8
CVSS3: 8.1

Описание

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

РелизСтатусПримечание
devel

released

2.4.18-2ubuntu4
esm-infra-legacy/trusty

released

2.4.7-1ubuntu4.13
esm-infra/xenial

released

2.4.18-2ubuntu3.1
precise

released

2.2.22-1ubuntu1.11
trusty

released

2.4.7-1ubuntu4.13
trusty/esm

released

2.4.7-1ubuntu4.13
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

released

2.4.12-2ubuntu2.1

Показывать по

EPSS

Процентиль: 99%
0.7312
Высокий

6.8 Medium

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 5
redhat
около 9 лет назад

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
nvd
около 9 лет назад

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
debian
около 9 лет назад

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 ...

suse-cvrf
около 9 лет назад

Security update for apache2

suse-cvrf
около 9 лет назад

Security update for apache2

EPSS

Процентиль: 99%
0.7312
Высокий

6.8 Medium

CVSS2

8.1 High

CVSS3