Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-5388

Опубликовано: 19 июл. 2016
Источник: ubuntu
Приоритет: low
CVSS2: 5.1
CVSS3: 8.1

Описание

Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-apps/xenial

needed

esm-infra-legacy/trusty

needed

esm-infra/focal

DNE

focal

DNE

Показывать по

РелизСтатусПримечание
artful

ignored

end of life
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

DNE

disco

DNE

eoan

DNE

esm-apps/bionic

needed

esm-apps/xenial

released

7.0.68-1ubuntu0.4+esm1
esm-infra-legacy/trusty

not-affected

7.0.52-1ubuntu0.8
esm-infra/focal

DNE

Показывать по

РелизСтатусПримечание
artful

not-affected

8.0.38-2
bionic

not-affected

8.0.38-2
cosmic

not-affected

8.0.38-2
devel

DNE

disco

DNE

eoan

DNE

esm-apps/bionic

not-affected

8.0.38-2
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

esm-infra/xenial

not-affected

8.0.32-1ubuntu1.3

Показывать по

5.1 Medium

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 3.5
redhat
почти 9 лет назад

Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
nvd
почти 9 лет назад

Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
debian
почти 9 лет назад

Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI S ...

suse-cvrf
почти 9 лет назад

Security update for tomcat6

CVSS3: 8.1
github
около 3 лет назад

Improper Access Control in Apache Tomcat

5.1 Medium

CVSS2

8.1 High

CVSS3

Уязвимость CVE-2016-5388