First published: Tue Dec 10 2019(Updated: )
inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/erlang | <=1:23.2.6+dfsg-1+deb11u1<=1:25.2.3+dfsg-1<=1:25.3.2.12+dfsg-1 | |
Erlang/OTP | <=22.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1000107 has a medium severity rating due to its potential to allow remote attackers to manipulate an application's outbound HTTP traffic.
To fix CVE-2016-1000107, ensure that you upgrade to a version of Erlang/OTP that is above 22.1.
CVE-2016-1000107 affects Erlang versions 22.1 and earlier, particularly those using HTTP_PROXY environment variables.
Yes, CVE-2016-1000107 can lead to unauthorized data access by redirecting outbound HTTP requests to untrusted destinations.
No, only versions 22.1 and earlier of Erlang/OTP are vulnerable to CVE-2016-1000107.