CVE-2016-5388

Priority
Description
Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI
Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not
protect applications from the presence of untrusted client data in the
HTTP_PROXY environment variable, which might allow remote attackers to
redirect an application's outbound HTTP traffic to an arbitrary proxy
server via a crafted Proxy header in an HTTP request, aka an "httpoxy"
issue. NOTE: the vendor states "A mitigation is planned for future releases
of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID
for a vulnerability.
Assigned-to
mdeslaur
Notes
mdeslaursetting priority to low, see upstream response for workarounds
for specific environments
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):released (6.0.35-1ubuntu3.9)
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
Package
Upstream:released (7.0.71)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):released (7.0.52-1ubuntu0.8)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
Patches:
Upstream:https://svn.apache.org/viewvc?view=revision&revision=1756942
Package
Upstream:released (8.0.37)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (8.0.32-1ubuntu1.3)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (8.0.38-2)
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
Patches:
Upstream:https://svn.apache.org/viewvc?view=revision&revision=1756941
More Information

Updated: 2020-09-09 20:50:23 UTC (commit b67d7d8b03f173f825cd706df5bd078bca500b0e)