Vulnerability Description
Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Hpc Node | 7.0 |
| Redhat | Enterprise Linux Hpc Node Eus | 7.2 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 7.2 |
| Redhat | Enterprise Linux Server Eus | 7.2 |
| Redhat | Enterprise Linux Server Tus | 7.2 |
| Redhat | Enterprise Linux Workstation | 7.0 |
| Hp | System Management Homepage | <= 7.5.5.0 |
| Oracle | Linux | 6 |
| Apache | Tomcat | >= 6.0, <= 6.0.45 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-1624.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2045.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2046.htmlThird Party Advisory
- http://www.kb.cert.org/vuls/id/797896Third Party AdvisoryUS Government Resource
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlPatchThird Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.hThird Party Advisory
- http://www.securityfocus.com/bid/91818Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1036331Third Party AdvisoryVDB EntryVendor Advisory
- https://access.redhat.com/errata/RHSA-2016:1635Third Party Advisory
- https://access.redhat.com/errata/RHSA-2016:1636Third Party Advisory
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_naThird Party Advisory
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-cThird Party Advisory
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-cThird Party Advisory
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-cThird Party Advisory
FAQ
What is CVE-2016-5388?
CVE-2016-5388 is a vulnerability with a CVSS score of 8.1 (HIGH). Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted clie...
How severe is CVE-2016-5388?
CVE-2016-5388 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-5388?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Hpc Node, Redhat Enterprise Linux Hpc Node Eus, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus.