CVE-2016-5386
high-risk
Published 2016-07-19
The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
Do I need to act?
!
45.9% chance of exploitation in next 30 days
EPSS score — higher than 54% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (8)
Affected Vendors
References (18)
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1538.html
Third Party Advisory
http://www.kb.cert.org/vuls/id/797896
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.h...
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1353798
Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na...
Third Party Advisory
https://httpoxy.org/
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1538.html
Third Party Advisory
http://www.kb.cert.org/vuls/id/797896
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.h...
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1353798
Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na...
Third Party Advisory
https://httpoxy.org/
55
/ 100
high-risk
Severity
24/34 · High
Exploitability
17/34 · Moderate
Exposure
14/34 · Moderate