CVE-2016-5387
Severity
8.1HIGH
EPSS
60.3%
top 1.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 19
Latest updateMay 13
Description
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not…
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages15 packages
Also affects: Debian Linux 8.0, Fedora 23, 24, Ubuntu Linux 12.04, 14.04, 15.10, 16.04, Enterprise Linux 7.2, 7.3, 7.4, 7.5, 7.6, 7.7
Patches
🔴Vulnerability Details
3📋Vendor Advisories
7💬Community
3Bugzilla▶
CVE-2016-5387 Apache HTTPD: sets environmental variable based on user supplied Proxy request header [jbews-2.1.0]↗2016-07-20
Bugzilla▶
CVE-2016-5387 Apache HTTPD: sets environmental variable based on user supplied Proxy request header [fedora-all]↗2016-07-18
Bugzilla▶
CVE-2016-5387 HTTPD: sets environmental variable based on user supplied Proxy request header↗2016-07-07