Lucene search

K
cveRedhatCVE-2016-5387
HistoryJul 19, 2016 - 2:00 a.m.

CVE-2016-5387

2016-07-1902:00:19
redhat
web.nvd.nist.gov
1110
5
apache
http server
vulnerability
remote attacks
outbound traffic
httpoxy issue
cve-2016-5387

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.2

Percentile

96.4%

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application’s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an “httpoxy” issue. NOTE: the vendor states “This mitigation has been assigned the identifier CVE-2016-5387”; in other words, this is not a CVE ID for a vulnerability.

Affected configurations

Nvd
Node
apachehttp_serverRange2.2.02.2.31
OR
apachehttp_serverRange2.4.12.4.23
Node
hpsystem_management_homepageRange7.5.5.0
Node
oraclecommunications_user_data_repositoryRange10.0.012.4
OR
oracleenterprise_manager_ops_centerMatch12.2.2
OR
oracleenterprise_manager_ops_centerMatch12.3.2
OR
oraclelinuxMatch5-
OR
oraclelinuxMatch6-
OR
oraclelinuxMatch7-
OR
oraclesolarisMatch11.3
Node
fedoraprojectfedoraMatch23
OR
fedoraprojectfedoraMatch24
Node
redhatjboss_web_serverMatch2.1.0
AND
redhatenterprise_linuxMatch6.0
OR
redhatenterprise_linuxMatch7.0
Node
redhatjboss_enterprise_web_serverMatch2.0.0
OR
redhatjboss_enterprise_web_serverMatch3.0.0
AND
redhatenterprise_linuxMatch6.0
Node
redhatjboss_enterprise_web_serverMatch2.0.0
OR
redhatjboss_enterprise_web_serverMatch3.0.0
AND
redhatenterprise_linuxMatch7.0
Node
redhatjboss_core_servicesMatch1.0
AND
redhatenterprise_linuxMatch6.0
OR
redhatenterprise_linuxMatch7.0
Node
redhatenterprise_linux_desktopMatch6.0
OR
redhatenterprise_linux_desktopMatch7.0
OR
redhatenterprise_linux_eusMatch7.2
OR
redhatenterprise_linux_eusMatch7.3
OR
redhatenterprise_linux_eusMatch7.4
OR
redhatenterprise_linux_eusMatch7.5
OR
redhatenterprise_linux_eusMatch7.6
OR
redhatenterprise_linux_eusMatch7.7
OR
redhatenterprise_linux_serverMatch6.0
OR
redhatenterprise_linux_serverMatch7.0
OR
redhatenterprise_linux_server_ausMatch7.2
OR
redhatenterprise_linux_server_ausMatch7.3
OR
redhatenterprise_linux_server_ausMatch7.4
OR
redhatenterprise_linux_server_ausMatch7.6
OR
redhatenterprise_linux_server_ausMatch7.7
OR
redhatenterprise_linux_server_tusMatch7.2
OR
redhatenterprise_linux_server_tusMatch7.3
OR
redhatenterprise_linux_server_tusMatch7.6
OR
redhatenterprise_linux_server_tusMatch7.7
OR
redhatenterprise_linux_workstationMatch6.0
OR
redhatenterprise_linux_workstationMatch7.0
Node
debiandebian_linuxMatch8.0
Node
canonicalubuntu_linuxMatch12.04-
OR
canonicalubuntu_linuxMatch14.04esm
OR
canonicalubuntu_linuxMatch15.10
OR
canonicalubuntu_linuxMatch16.04esm
Node
opensuseleapMatch42.1
OR
opensuseopensuseMatch13.2
VendorProductVersionCPE
apachehttp_server*cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
hpsystem_management_homepage*cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*
oraclecommunications_user_data_repository*cpe:2.3:a:oracle:communications_user_data_repository:*:*:*:*:*:*:*:*
oracleenterprise_manager_ops_center12.2.2cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*
oracleenterprise_manager_ops_center12.3.2cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.2:*:*:*:*:*:*:*
oraclelinux5cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
oraclelinux6cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
oraclelinux7cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
oraclesolaris11.3cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
fedoraprojectfedora23cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
Rows per page:
1-10 of 451

References

Social References

More

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.2

Percentile

96.4%