Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Apache
Subscribe
|
Tomcat
Subscribe
|
|
Hp
Subscribe
|
System Management Homepage
Subscribe
|
|
Oracle
Subscribe
|
Linux
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Hpc Node
Subscribe
Enterprise Linux Hpc Node Eus
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Eus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Jboss Enterprise Web Server
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1883-1 | tomcat8 security update |
Github GHSA |
GHSA-v646-rx6w-r3qq | Improper Access Control in Apache Tomcat |
Ubuntu USN |
USN-3177-1 | Tomcat vulnerabilities |
Ubuntu USN |
USN-4791-1 | Apache Tomcat 7 vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T01:00:59.990Z
Reserved: 2016-06-10T00:00:00
Link: CVE-2016-5388
No data.
Status : Deferred
Published: 2016-07-19T02:00:20.820
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-5388
OpenCVE Enrichment
No data.
Debian DLA
Github GHSA
Ubuntu USN