The "http-client" egg always used a HTTP_PROXY environment variable to determine whether HTTP traffic should be routed via a proxy, even when running as a CGI process. Under several web servers this would mean a user-supplied "Proxy" header could allow an attacker to direct all HTTP requests through a proxy (also known as a "httpoxy" attack). This affects all versions of http-client before 0.10.
References
Link | Resource |
---|---|
http://lists.gnu.org/archive/html/chicken-announce/2016-07/msg00000.html | Mitigation Third Party Advisory |
http://www.securityfocus.com/bid/92105 | Third Party Advisory VDB Entry |
http://lists.gnu.org/archive/html/chicken-announce/2016-07/msg00000.html | Mitigation Third Party Advisory |
http://www.securityfocus.com/bid/92105 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 02:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.gnu.org/archive/html/chicken-announce/2016-07/msg00000.html - Mitigation, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/92105 - Third Party Advisory, VDB Entry |
Information
Published : 2017-01-10 15:59
Updated : 2024-11-21 02:55
NVD link : CVE-2016-6287
Mitre link : CVE-2016-6287
CVE.ORG link : CVE-2016-6287
JSON object : View
Products Affected
call-cc
- http-client
CWE
CWE-19
Data Processing Errors