Vulnerability Details : CVE-2016-6287
The "http-client" egg always used a HTTP_PROXY environment variable to determine whether HTTP traffic should be routed via a proxy, even when running as a CGI process. Under several web servers this would mean a user-supplied "Proxy" header could allow an attacker to direct all HTTP requests through a proxy (also known as a "httpoxy" attack). This affects all versions of http-client before 0.10.
Products affected by CVE-2016-6287
- cpe:2.3:a:call-cc:http-client:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-6287
0.70%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 70 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-6287
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-6287
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-6287
-
http://www.securityfocus.com/bid/92105
Multiple CHICKEN Egg Products Multiple Security Bypass VulnerabilitiesThird Party Advisory;VDB Entry
-
http://lists.gnu.org/archive/html/chicken-announce/2016-07/msg00000.html
[Chicken-announce] [SECURITY] spiffy-cgi-handlers and http-client updateMitigation;Third Party Advisory
Jump to