| Vulnerability Name: | CVE-2016-1000108 (CCN-115826) | ||||||||||||||||||||||||||||||||||||||||||||
| Assigned: | 2016-07-18 | ||||||||||||||||||||||||||||||||||||||||||||
| Published: | 2016-07-18 | ||||||||||||||||||||||||||||||||||||||||||||
| Updated: | 2020-08-18 | ||||||||||||||||||||||||||||||||||||||||||||
| Summary: | yaws before 2.0.4 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. | ||||||||||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:U/RC:R)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-601 | ||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2016-1000108 Source: CCN Type: oss-sec Mailing List, Mon, 18 Jul 2016 08:17:03 -0600 Re: A CGI application vulnerability for PHP, Go, Python and others Source: MISC Type: Mailing List, Third Party Advisory http://www.openwall.com/lists/oss-security/2016/07/18/6 Source: XF Type: UNKNOWN yaws-cve20161000108-redirect(115826) Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/klacke/yaws/commit/9d8fb070e782c95821c90d0ca7372fc6d7316c78#diff-54053c47eb173a90c26ed19bd9d106c1 Source: CCN Type: httpoxy Web site httpoxy Source: MISC Type: Third Party Advisory https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000108.json Source: MISC Type: Third Party Advisory https://security-tracker.debian.org/tracker/CVE-2016-1000108 | ||||||||||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||||||||||