CVE-2016-5385
Publication date 18 July 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.
Status
Package | Ubuntu Release | Status |
---|---|---|
php5 | 16.04 LTS xenial | Not in release |
14.04 LTS trusty |
Fixed 5.5.9+dfsg-1ubuntu4.19
|
|
php7.0 | 16.04 LTS xenial |
Fixed 7.0.8-0ubuntu0.16.04.2
|
14.04 LTS trusty | Not in release | |
Patch details
Package | Patch details |
---|---|
php5 | |
php7.0 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3045-1
- PHP vulnerabilities
- 2 August 2016