[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3623-1 apache2 -- apache2

ID: oval:org.secpod.oval:def:602561Date: (C)2016-07-21   (M)2023-12-20
Class: PATCHFamily: unix




Scott Geary of VendHQ discovered that the Apache HTTPD server used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.

Platform:
Debian 8.x
Product:
apache2
Reference:
DSA-3623-1
CVE-2016-5387
CVE    1
CVE-2016-5387
CPE    2
cpe:/a:apache:apache2
cpe:/o:debian:debian_linux:8.x

© SecPod Technologies