{
  "threat_severity" : "Moderate",
  "public_date" : "2016-07-18T00:00:00Z",
  "bugzilla" : {
    "description" : "Tomcat: CGI sets environmental variable based on user supplied Proxy request header",
    "id" : "1353809",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1353809"
  },
  "cvss" : {
    "cvss_base_score" : "2.6",
    "cvss_scoring_vector" : "AV:N/AC:H/Au:N/C:N/I:P/A:N",
    "status" : "verified"
  },
  "cvss3" : {
    "cvss3_base_score" : "3.5",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-20",
  "details" : [ "Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue. NOTE: the vendor states \"A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388\"; in other words, this is not a CVE ID for a vulnerability.", "It was discovered that tomcat used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request." ],
  "acknowledgement" : "Red Hat would like to thank Scott Geary (VendHQ) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2016-10-10T00:00:00Z",
    "advisory" : "RHSA-2016:2045",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "tomcat6-0:6.0.24-98.el6_8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2016-10-10T00:00:00Z",
    "advisory" : "RHSA-2016:2046",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "tomcat-0:7.0.54-8.el7_2"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3.0",
    "release_date" : "2016-08-17T00:00:00Z",
    "advisory" : "RHSA-2016:1624",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.0"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 6",
    "release_date" : "2016-08-18T00:00:00Z",
    "advisory" : "RHSA-2016:1636",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.0::el6",
    "package" : "httpd24-0:2.4.6-62.ep7.el6"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 6",
    "release_date" : "2016-08-18T00:00:00Z",
    "advisory" : "RHSA-2016:1636",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.0::el6",
    "package" : "tomcat7-0:7.0.59-51_patch_01.ep7.el6"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 6",
    "release_date" : "2016-08-18T00:00:00Z",
    "advisory" : "RHSA-2016:1636",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.0::el6",
    "package" : "tomcat8-0:8.0.18-62_patch_01.ep7.el6"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 7",
    "release_date" : "2016-08-18T00:00:00Z",
    "advisory" : "RHSA-2016:1635",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.0::el7",
    "package" : "httpd24-0:2.4.6-62.ep7.el7"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 7",
    "release_date" : "2016-08-18T00:00:00Z",
    "advisory" : "RHSA-2016:1635",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.0::el7",
    "package" : "tomcat7-0:7.0.59-51_patch_01.ep7.el7"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 7",
    "release_date" : "2016-08-18T00:00:00Z",
    "advisory" : "RHSA-2016:1635",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.0::el7",
    "package" : "tomcat8-0:8.0.18-62_patch_01.ep7.el7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Under investigation",
    "package_name" : "tomcat5",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 5",
    "fix_state" : "Will not fix",
    "package_name" : "jbossas",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:5"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 6",
    "fix_state" : "Affected",
    "package_name" : "Tomcat",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:6"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 1",
    "fix_state" : "Will not fix",
    "package_name" : "tomcat",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:1"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2",
    "fix_state" : "Affected",
    "package_name" : "tomcat7",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2",
    "fix_state" : "Affected",
    "package_name" : "tomcat8",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 3",
    "fix_state" : "Affected",
    "package_name" : "tomcat6",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2016-5388\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-5388" ],
  "name" : "CVE-2016-5388",
  "csaw" : false
}