The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
|
Configuration 10 (hide)
|
Configuration 11 (hide)
|
Configuration 12 (hide)
|
Information
Published : 2016-07-18 19:00
Updated : 2022-09-07 10:40
NVD link : CVE-2016-5387
Mitre link : CVE-2016-5387
JSON object : View
CWE
Products Affected
apache
- http_server
hp
- system_management_homepage
canonical
- ubuntu_linux
redhat
- jboss_enterprise_web_server
- enterprise_linux
- jboss_core_services
- jboss_web_server
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_desktop
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_eus
oracle
- enterprise_manager_ops_center
- communications_user_data_repository
- solaris
- linux
fedoraproject
- fedora
debian
- debian_linux
opensuse
- opensuse
- leap