Bug 989532 (CVE-2016-1000108) - VUL-0: CVE-2016-1000108: yaws: Setting HTTP_PROXY environment variable via Proxy header (httpoxy)
Summary: VUL-0: CVE-2016-1000108: yaws: Setting HTTP_PROXY environment variable via Pr...
Status: RESOLVED INVALID
Alias: CVE-2016-1000108
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.1
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: Leap 15.1
Assignee: Alex Simonov
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks: httpoxy
  Show dependency treegraph
 
Reported: 2016-07-19 11:55 UTC by Andreas Stieger
Modified: 2020-04-30 14:29 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2016-07-19 11:55:28 UTC
Courtesy bug from the SUSE Security team against devel:languages:erlang/yaws

https://marc.info/?l=oss-security&m=146885145004975&w=2

From https://httpoxy.org/

 A CGI application vulnerability
for PHP, Go, Python and others

httpoxy is a set of vulnerabilities that affect application code running in CGI, or CGI-like environments. It comes down to a simple namespace conflict:

    RFC 3875 (CGI) puts the HTTP Proxy header from a request into the environment variables as HTTP_PROXY
    HTTP_PROXY is a popular environment variable used to configure an outgoing proxy

This leads to a remotely exploitable vulnerability. If you’re running PHP or CGI, you should block the Proxy header now. Here’s how.

httpoxy is a vulnerability for server-side web applications. If you’re not deploying code, you don’t need to worry.
What can happen if my web application is vulnerable?

If a vulnerable HTTP client makes an outgoing HTTP connection, while running in a server-side CGI application, an attacker may be able to:

    Proxy the outgoing HTTP requests made by the web application
    Direct the server to open outgoing connections to an address and port of their choosing
    Tie up server resources by forcing the vulnerable software to use a malicious proxy

httpoxy is extremely easy to exploit in basic form. And we expect security researchers to be able to scan for it quickly. Luckily, if you read on and find you are affected, easy mitigations are available.



References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1000108
http://seclists.org/oss-sec/2016/q3/95
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1000108.html
Comment 1 Swamp Workflow Management 2016-07-19 22:00:26 UTC
bugbot adjusting priority
Comment 2 Alexandros Toptsoglou 2020-04-30 14:29:08 UTC
We do not ship yaws. Closing