vulnerability
Red Hat: CVE-2016-5385: Moderate: php security and bug fix update ((Multiple Advisories))
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:H/Au:N/C:P/I:P/A:P) | Jul 18, 2016 | Aug 24, 2016 | Jan 17, 2018 |
Severity
5
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Published
Jul 18, 2016
Added
Aug 24, 2016
Modified
Jan 17, 2018
Description
PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.
Solution(s)
redhat-upgrade-phpredhat-upgrade-php-bcmathredhat-upgrade-php-cliredhat-upgrade-php-commonredhat-upgrade-php-dbaredhat-upgrade-php-debuginforedhat-upgrade-php-develredhat-upgrade-php-embeddedredhat-upgrade-php-enchantredhat-upgrade-php-fpmredhat-upgrade-php-gdredhat-upgrade-php-imapredhat-upgrade-php-intlredhat-upgrade-php-ldapredhat-upgrade-php-mbstringredhat-upgrade-php-mysqlredhat-upgrade-php-mysqlndredhat-upgrade-php-odbcredhat-upgrade-php-pdoredhat-upgrade-php-pgsqlredhat-upgrade-php-processredhat-upgrade-php-pspellredhat-upgrade-php-recoderedhat-upgrade-php-snmpredhat-upgrade-php-soapredhat-upgrade-php-tidyredhat-upgrade-php-xmlredhat-upgrade-php-xmlrpcredhat-upgrade-php-zts

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.