CVE-2016-6287

Published on: 01/10/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:11 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Certain versions of Http-client from Call-cc contain the following vulnerability:

The "http-client" egg always used a HTTP_PROXY environment variable to determine whether HTTP traffic should be routed via a proxy, even when running as a CGI process. Under several web servers this would mean a user-supplied "Proxy" header could allow an attacker to direct all HTTP requests through a proxy (also known as a "httpoxy" attack). This affects all versions of http-client before 0.10.

  • CVE-2016-6287 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE HIGH NONE

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL NONE

CVE References

Description Tags Link
[Chicken-announce] [SECURITY] spiffy-cgi-handlers and http-client update Mitigation
Third Party Advisory
lists.gnu.org
text/html
URL Logo MLIST [chicken-announce] 20160721 [SECURITY] spiffy-cgi-handlers and http-client updated to prevent "httpoxy" attack
Multiple CHICKEN Egg Products Multiple Security Bypass Vulnerabilities Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 92105

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCall-ccHttp-clientAllAllAllAll
  • cpe:2.3:a:call-cc:http-client:*:*:*:*:*:*:*:*: