vulnerability
Red Hat: CVE-2016-5385: Moderate: php security and bug fix update ((Multiple Advisories))
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:H/Au:N/C:P/I:P/A:P) | 2016-07-18 | 2016-08-24 | 2018-01-17 |
Severity
5
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Published
2016-07-18
Added
2016-08-24
Modified
2018-01-17
Description
PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.
Solution(s)
redhat-upgrade-phpredhat-upgrade-php-bcmathredhat-upgrade-php-cliredhat-upgrade-php-commonredhat-upgrade-php-dbaredhat-upgrade-php-debuginforedhat-upgrade-php-develredhat-upgrade-php-embeddedredhat-upgrade-php-enchantredhat-upgrade-php-fpmredhat-upgrade-php-gdredhat-upgrade-php-imapredhat-upgrade-php-intlredhat-upgrade-php-ldapredhat-upgrade-php-mbstringredhat-upgrade-php-mysqlredhat-upgrade-php-mysqlndredhat-upgrade-php-odbcredhat-upgrade-php-pdoredhat-upgrade-php-pgsqlredhat-upgrade-php-processredhat-upgrade-php-pspellredhat-upgrade-php-recoderedhat-upgrade-php-snmpredhat-upgrade-php-soapredhat-upgrade-php-tidyredhat-upgrade-php-xmlredhat-upgrade-php-xmlrpcredhat-upgrade-php-zts

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.