Bug 988492 (CVE-2016-1000104) - VUL-0: CVE-2016-1000104: apache2-mod_fcgid: Setting HTTP_PROXY environment variable via Proxy header (httpoxy)
Summary: VUL-0: CVE-2016-1000104: apache2-mod_fcgid: Setting HTTP_PROXY environment va...
Status: RESOLVED DUPLICATE of bug 988488
Alias: CVE-2016-1000104
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: E-Mail List
QA Contact: Security Team bot
URL:
Whiteboard: CVSSv2:SUSE:CVE-2016-1000104:5.0:(AV:...
Keywords:
Depends on:
Blocks: httpoxy
  Show dependency treegraph
 
Reported: 2016-07-12 07:06 UTC by Andreas Stieger
Modified: 2016-07-27 16:00 UTC (History)
7 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Swamp Workflow Management 2016-07-12 22:01:51 UTC
bugbot adjusting priority
Comment 2 Simon Lees 2016-07-15 05:30:32 UTC
This should be reproducible in the same way as https://bugzilla.suse.com/show_bug.cgi?id=988488 but using mod_fcgid instead of mod_cgid
Comment 6 Peter Simons 2016-07-15 12:53:23 UTC
Courtesy of @osukup, FastCGI echo reposonders can be found at https://httpd.apache.org/mod_fcgid/mod/mod_fcgid.html#examples.
Comment 8 Andreas Stieger 2016-07-18 14:09:41 UTC
public at https://httpoxy.org/

Quoting from https://www.apache.org/security/asf-httpoxy-response.txt

Advisory: Apache Software Foundation Projects and "httpoxy" CERT VU#797896

Canonical URL: https://www.apache.org/security/asf-httpoxy-response.txt

Publication: v1.0  18 July 2016


Audience
--------

This Advisory is directed to HTTP web server administrators and users of
the software indicated below, including CGI developers.

This Advisory is not directed to a general audience, especially web browser
users. The issues raised by the "httpoxy" class of vulnerabilities affect
web servers, and are not an issue for consumers of web services to address.


Background
----------

The ASF (Apache Software Foundation) offers a number of software packages
which offer HTTP protocol ("Web") requests and responses, and offer the
developer or admininstrator CGI (Common Gateway Interface) routing through
these software packages.

The Apache HTTP Server (httpd and mod_fcgid), Apache Perl (mod_perl) and
Apache Tomcat projects all offer CGI handling of HTTP requests.

The Apache Traffic Server proxies HTTP requests, but offers no CGI support.

Many other ASF projects utilize the HTTP protocol, but at this time we have
not identified any which provide CGI handling, or forward the HTTP "Proxy:"
header implicated in the "httpoxy" class of issues. In the event that other
projects discover such a defect, or can contribute to mitigating this class
of issues, this Advisory will be updated.

Note especially that PHP (http://www.php.net) is not an Apache Software
Foundation project (this is a common point of confusion), and that this
Advisory does not attempt to address third-party software, scripts, 
libraries or components affected by the "httpoxy" group of issues.

See https://httpoxy.org/ (not affiliated with the ASF) for a complete 
discussion of the "httpoxy" class of issues, which are not reiterated
in this advisory.

The Apache Software Foundation wishes to thank Dominic Scheirlinck
and Scott Geary of Vend for bringing this issue to the attention of
the ASF Security Team for a well-coordinated community response.


Apache HTTP Server (httpd)
--------------------------
[...]
Apache HTTP Server (mod_fcgid)
------------------------------

Either mitigation listed above for Apache HTTP Server (httpd) guidance above
also mitigates all risks for CGI's which are invoked by mod_fcgid. Therefore
any CVE with respect to mod_fcgid is revoked as duplicate of CVE-2016-5387.

*** This bug has been marked as a duplicate of bug 988488 ***
Comment 9 Swamp Workflow Management 2016-07-18 17:09:49 UTC
SUSE-SU-2016:1820-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 988492
CVE References: CVE-2016-1000104
Sources used:
SUSE Linux Enterprise Software Development Kit 11-SP4 (src):    apache2-mod_fcgid-2.2-31.29.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    apache2-mod_fcgid-2.2-31.29.1
Comment 10 Marcus Meissner 2016-07-25 09:25:23 UTC
.
Comment 11 Bernhard Wiedemann 2016-07-27 16:00:32 UTC
This is an autogenerated message for OBS integration:
This bug (988492) was mentioned in
https://build.opensuse.org/request/show/415415 13.2+42.1 / apache2-mod_fcgid