Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2016-5386 | First vendor Publication | 2016-07-18 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 8.1 | ||
Base Score | 8.1 | Environmental Score | 8.1 |
impact SubScore | 5.9 | Temporal Score | 8.1 |
Exploitabality Sub Score | 2.2 | ||
Attack Vector | Network | Attack Complexity | High |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5386 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-284 | Access Control (Authorization) Issues |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2016-07-28 | HttpOxy CGI application vulnerability potential man-in-the-middle attempt RuleID : 39737-community - Revision : 2 - Type : SERVER-WEBAPP |
2016-08-31 | HttpOxy CGI application vulnerability potential man-in-the-middle attempt RuleID : 39737 - Revision : 2 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-07-20 | Name : An enterprise management application installed on the remote host is affected... File : oracle_enterprise_manager_jul_2017_cpu.nasl - Type : ACT_GATHER_INFO |
2017-06-26 | Name : The Tenable SecurityCenter application on the remote host contains a web serv... File : securitycenter_apache_2_4_25.nasl - Type : ACT_GATHER_INFO |
2017-03-31 | Name : The remote host is missing a macOS update that fixes multiple security vulner... File : macos_10_12_4.nasl - Type : ACT_GATHER_INFO |
2017-03-14 | Name : An application installed on the remote host is affected by multiple vulnerabi... File : securitycenter_5_4_3_tns_2017_04.nasl - Type : ACT_GATHER_INFO |
2017-01-12 | Name : The remote web server is affected by multiple vulnerabilities. File : apache_2_4_25.nasl - Type : ACT_GATHER_INFO |
2017-01-12 | Name : The remote web server is affected by multiple vulnerabilities. File : apache_2_2_32.nasl - Type : ACT_GATHER_INFO |
2016-11-09 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_6.nasl - Type : ACT_GATHER_INFO |
2016-08-18 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2016-731.nasl - Type : ACT_GATHER_INFO |
2016-08-12 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-979.nasl - Type : ACT_GATHER_INFO |
2016-08-04 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20160803_golang_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2016-08-03 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-1538.nasl - Type : ACT_GATHER_INFO |
2016-08-03 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-1538.nasl - Type : ACT_GATHER_INFO |
2016-08-03 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-1538.nasl - Type : ACT_GATHER_INFO |
2016-07-29 | Name : The remote Fedora host is missing a security update. File : fedora_2016-ea5e284d34.nasl - Type : ACT_GATHER_INFO |
2016-07-29 | Name : The remote Fedora host is missing a security update. File : fedora_2016-340e361b90.nasl - Type : ACT_GATHER_INFO |
2016-07-26 | Name : The version of PHP running on the remote web server is affected by multiple v... File : php_7_0_9.nasl - Type : ACT_GATHER_INFO |
2016-07-26 | Name : The version of PHP running on the remote web server is affected by multiple v... File : php_5_6_24.nasl - Type : ACT_GATHER_INFO |
2016-07-26 | Name : The version of PHP running on the remote web server is affected by multiple v... File : php_5_5_38.nasl - Type : ACT_GATHER_INFO |
2016-07-25 | Name : The remote web application is affected by a man-in-the-middle vulnerability. File : http_httpoxy.nasl - Type : ACT_ATTACK |
2016-07-21 | Name : A PHP application running on the remote web server is affected by a man-in-th... File : drupal_8_1_7.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:57:34 |
|
2023-11-07 21:43:48 |
|
2022-08-16 17:27:48 |
|
2021-05-04 12:51:23 |
|
2021-04-22 02:04:14 |
|
2020-05-23 02:00:42 |
|
2020-05-23 00:52:14 |
|
2019-04-20 12:06:59 |
|
2017-11-09 12:07:23 |
|
2017-08-25 09:22:57 |
|
2017-08-09 09:23:34 |
|
2017-07-21 13:24:50 |
|
2016-09-28 21:24:34 |
|
2016-09-28 09:23:44 |
|
2016-08-19 13:25:15 |
|
2016-08-16 21:25:09 |
|
2016-08-13 13:26:56 |
|
2016-08-12 09:24:59 |
|
2016-08-09 09:24:10 |
|
2016-08-05 13:26:03 |
|
2016-08-04 13:25:52 |
|
2016-07-30 13:23:42 |
|
2016-07-26 13:25:55 |
|
2016-07-20 01:00:26 |
|
2016-07-19 12:02:29 |
|