CVE-2016-1000107
Publication date 10 December 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Description
inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| erlang | ||
| 16.04 LTS xenial | Ignored | |
| 14.04 LTS trusty | Ignored end of ESM support, was ignored [trusty was ignored] | |
Notes
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | Required |
| Scope | Changed |
| Confidentiality | Low |
| Integrity impact | Low |
| Availability impact | None |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |