1 min read

Mitigation Instructions for CVE-2016-5385

Mitigation Instructions for CVE-2016-5385

Subject: CVE-2016-5385 HTTPoxy Vulnerability

Tech Stack:

  • CGI-based applications

Date Issued:

  • Original Date: 2016-07-18
  • Last Modified Date: 2016-07-20

Criticality:

  • Severity: High
  • Description: This vulnerability allows remote attackers to proxy HTTP requests to arbitrary domains, leading to information disclosure or remote code execution.

Overview:

  • CVE-2016-5385, also known as the HTTPoxy vulnerability, affects web applications using the CGI or CGI-like environments. The vulnerability exploits the HTTP_PROXY environment variable, which can be manipulated by an attacker to route requests through a malicious server.

Attack Mechanisms:

  1. Attacker sends a crafted HTTP request with a Proxy header.
  2. The web server sets the HTTP_PROXY environment variable based on this header.
  3. The CGI application makes an HTTP request that gets proxied through the attacker’s server.

Affected Systems:

  • Web servers running CGI-based applications, including PHP, Python, and Ruby.

Mitigation Solution:

  1. Upgrade: Apply patches provided by your web server and framework vendors.
  2. Configuration: Set a policy to ignore the HTTP_PROXY variable. For example, in Apache, you can unset the environment variable using:
    php
     
    <IfModule mod_headers.c>
    RequestHeader unset Proxy early
    </IfModule>
  3. Environment Variables: Secure environment variables and avoid relying on user-controlled input for configuration.

References:

Mitigation Instructions for CVE-2016-4437

Mitigation Instructions for CVE-2016-4437

Mitigating CVE-2016-4437: Remote Code Execution Vulnerability in Apache ActiveMQ

Read More
Mitigation Instructions for CVE-2013-1896

Mitigation Instructions for CVE-2013-1896

Mitigating CVE-2013-1896: Privilege Escalation Vulnerability in Puppet

Read More
Mitigation Instructions for CVE-2014-6271 Shellshock Vulnerability in Bash

Mitigation Instructions for CVE-2014-6271 Shellshock Vulnerability in Bash

Subject: Mitigating CVE-2014-6271: Shellshock Vulnerability in Bash

Read More