CVE-2016-5387

Scores

EPSS

0.775medium77.5%
0%20%40%60%80%100%

Percentile: 77.5%

CVSS

5.0medium3.x
0246810

CVSS Score: 5.0/10

All CVSS Scores

CVSS 3.x
5.0

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Description

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application’s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an “httpoxy” issue. NOTE: the vendor states “This mitigation has been assigned the identifier CVE-2016-5387”; in other words, this is not a CVE ID for a vulnerability.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-20

Recommendations

Source: nvd

For details on how to apply this update, which includes the changesdescribed in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon will be restartedautomatically.

URL: https://access.redhat.com/errata/RHSA-2016:1851

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon will be restarted automatically.

URL: https://access.redhat.com/errata/RHSA-2016:1422

Source: nvd

For details on how to apply this update, which includes the changes described inthis advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon will be restartedautomatically.

URL: https://access.redhat.com/errata/RHSA-2016:1421

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon will be restarted automatically.

URL: https://access.redhat.com/errata/RHSA-2016:1420

Vulnerable Software (56)

Type: Configuration

Product: apache2

Operating System: ubuntu xenial 16.04

Trait:
{  "fixed": "2.4.18-2ubuntu3.1"}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu wily 15.10

Trait:
{  "fixed": "2.4.12-2ubuntu2.1"}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu trusty 14.04

Trait:
{  "fixed": "2.4.7-1ubuntu4.13"}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: debian

Trait:
{  "fixed": "2.4.23-2"}

Source: debian

Type: Configuration

Product: httpd

Operating System: rhel 5

Trait:
{  "fixed": "2.2.3-92.el5_11"}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel 6

Trait:
{  "fixed": "2.2.15-54.el6_8"}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel 7

Trait:
{  "fixed": "2.4.6-40.el7_2.4"}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel

Trait:
{  "fixed": "2.2.26-54.ep6.el6"}

Source: redhat

Type: Configuration

Product: httpd22

Operating System: rhel

Trait:
{  "fixed": "2.2.26-56.ep6.el7"}

Source: redhat

Type: Configuration

Product: httpd24

Operating System: rhel

Trait:
{  "fixed": "2.4.6-62.ep7.el7"}

Source: redhat