High severity8.1NVD Advisory· Published Jul 19, 2016· Updated May 6, 2026
CVE-2016-5385
CVE-2016-5385
Description
PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.
Affected products
18- cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*Range: <=7.5.5.0
cpe:2.3:a:oracle:communications_user_data_repository:10.0.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:oracle:communications_user_data_repository:10.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:communications_user_data_repository:10.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:communications_user_data_repository:12.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.2:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
- cpe:2.3:o:hp:storeever_msl6480_tape_library_firmware:*:*:*:*:*:*:*:*Range: <=5.09
cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
25- www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlnvdPatchThird Party Advisory
- www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlnvdPatchThird Party Advisory
- lists.opensuse.org/opensuse-updates/2016-08/msg00003.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-1609.htmlnvdBroken LinkThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-1610.htmlnvdBroken LinkThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-1611.htmlnvdBroken LinkThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-1612.htmlnvdBroken LinkThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-1613.htmlnvdBroken LinkThird Party Advisory
- www.debian.org/security/2016/dsa-3631nvdThird Party Advisory
- www.kb.cert.org/vuls/id/797896nvdThird Party AdvisoryUS Government Resource
- www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/91821nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1036335nvdThird Party AdvisoryVDB Entry
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party AdvisoryVDB Entry
- github.com/guzzle/guzzle/releases/tag/6.2.1nvdRelease NotesThird Party Advisory
- h20566.www2.hpe.com/hpsc/doc/public/displaynvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- httpoxy.orgnvdThird Party Advisory
- security.gentoo.org/glsa/201611-22nvdThird Party Advisory
- www.drupal.org/SA-CORE-2016-003nvdThird Party Advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/nvd
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/nvd
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/nvd
News mentions
0No linked articles in our index yet.