It was discovered that httpd used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.
Unitrends risk assessment: High
For CentOS6, resolved in httpd-2.2.15-54.el6 included in the latest security update
For CentOS5, resolved in httpd-2.2.3-92.el5_11, not included. Migrate to CentOS6.
LINK TO ADVISORIES
- https://access.redhat.com/security/cve/cve-2016-5387 https://rhn.redhat.com/errata/RHSA-2016-1421.html https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5387