CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. 漏洞列表
  3. 正文

Web Application HTTP Poxy injection (httpoxy)

2017年5月24日 891点热度 0人点赞 0条评论

漏洞类别:Web Application

漏洞等级:

漏洞信息

The web application uses http client library for making server-side HTTP requests. The http library used is vulnerable to httpoxy attack. The library uses environment variable "HTTP_PROXY" to configure an outgoing proxy. As specified in RFC 3875, CGI puts the "Proxy" header from a request into the environment variables as HTTP_PROXY. An attacker can make the library use malicious HTTP proxy under his/her control by sending a crafted HTTP request (by specifying the malicious proxy as value for "Proxy" header). More details are available at https://httpoxy.org/.

漏洞危害

An attacker can divert outgoing HTTP requests made by the vulnerable application to a HTTP Server or proxy of his/her choice. Thus attacker can obtain sensitive information from these HTTP requests. The attacker can also include content of his/her choice in the response to such requests which could be used to influence business logic decisions on the application.

解决方案

Use mitigation steps described at https://httpoxy.org/ The vulnerability can be mitigated by configuring the web server to remove or drop "Proxy" headers from all the incoming HTTP requests before it reaches CGI layer.

0daybank

标签: 暂无
最后更新:2017年5月24日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me