CVE-2016-1000107Open Redirect in OTP

Severity
6.1MEDIUMNVD
EPSS
0.5%
top 34.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 10
Latest updateMay 24

Description

inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages2 packages

Debianerlang/erlang_otp< 1:27.3.4.1+dfsg-1+deb13u1+1

🔴Vulnerability Details

3
GHSA
GHSA-v875-g963-fhg4: inets in Erlang possibly 222022-05-24
CVEList
CVE-2016-1000107: inets in Erlang possibly 222019-12-10
OSV
CVE-2016-1000107: inets in Erlang possibly 222019-12-10

📋Vendor Advisories

2
Red Hat
erlang: allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy serve2019-12-10
Debian
CVE-2016-1000107: erlang - inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and th...2016

💬Community

3
Bugzilla
CVE-2016-1000107 erlang: allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy serve [fedora-all]2020-04-16
Bugzilla
CVE-2016-1000107 erlang: allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy serve [epel-8]2020-04-16
Bugzilla
CVE-2016-1000107 erlang: allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy serve2020-04-16
CVE-2016-1000107 — Open Redirect in Erlang OTP | cvebase