Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-1000105 (GCVE-0-2016-1000105)
Vulnerability from cvelistv5 – Published: 2020-01-31 21:38 – Updated: 2020-01-31 21:38
VLAI?
EPSS
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2020-01-31T21:38:27",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"rejectedReasons": [
{
"lang": "en",
"value": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-1000105",
"datePublished": "2020-01-31T21:38:27",
"dateRejected": "2020-01-31T21:38:27",
"dateReserved": "2016-07-18T00:00:00",
"dateUpdated": "2020-01-31T21:38:27",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2016-1000105\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-01-31T22:15:11.370\",\"lastModified\":\"2023-11-07T02:29:26.130\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none\"}],\"metrics\":{},\"references\":[]}}"
}
}
GSD-2016-1000105
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2016-1000105",
"description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"id": "GSD-2016-1000105",
"references": [
"https://www.suse.com/security/cve/CVE-2016-1000105.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-1000105"
],
"details": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"id": "GSD-2016-1000105",
"modified": "2023-12-13T01:21:18.101418Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-1000105",
"STATE": "REJECT"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
]
}
}
}
}
SUSE-SU-2017:0190-1
Vulnerability from csaf_suse - Published: 2017-01-17 17:04 - Updated: 2017-01-17 17:04Summary
Security update for nginx-1.0
Notes
Title of the patch
Security update for nginx-1.0
Description of the patch
This update for nginx-1.0 fixes the following issues:
This security issues fixed:
- CVE-2016-4450: NULL pointer dereference while writing client request body (bsc#982505).
- CVE-2016-1000105: Setting HTTP_PROXY environment variable via Proxy header (httpoxy) (bnc#988491).
Patchnames
sleslms13-nginx-12945,slestso13-nginx-12945,slewyst13-nginx-12945
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nginx-1.0",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nginx-1.0 fixes the following issues:\n\nThis security issues fixed:\n- CVE-2016-4450: NULL pointer dereference while writing client request body (bsc#982505).\n- CVE-2016-1000105: Setting HTTP_PROXY environment variable via Proxy header (httpoxy) (bnc#988491).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleslms13-nginx-12945,slestso13-nginx-12945,slewyst13-nginx-12945",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0190-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:0190-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170190-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:0190-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-January/002566.html"
},
{
"category": "self",
"summary": "SUSE Bug 982505",
"url": "https://bugzilla.suse.com/982505"
},
{
"category": "self",
"summary": "SUSE Bug 988491",
"url": "https://bugzilla.suse.com/988491"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1000105 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1000105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4450 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4450/"
}
],
"title": "Security update for nginx-1.0",
"tracking": {
"current_release_date": "2017-01-17T17:04:53Z",
"generator": {
"date": "2017-01-17T17:04:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:0190-1",
"initial_release_date": "2017-01-17T17:04:53Z",
"revision_history": [
{
"date": "2017-01-17T17:04:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nginx-1.0-1.0.15-0.34.1.i586",
"product": {
"name": "nginx-1.0-1.0.15-0.34.1.i586",
"product_id": "nginx-1.0-1.0.15-0.34.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nginx-1.0-1.0.15-0.34.1.ia64",
"product": {
"name": "nginx-1.0-1.0.15-0.34.1.ia64",
"product_id": "nginx-1.0-1.0.15-0.34.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "nginx-1.0-1.0.15-0.34.1.ppc64",
"product": {
"name": "nginx-1.0-1.0.15-0.34.1.ppc64",
"product_id": "nginx-1.0-1.0.15-0.34.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "nginx-1.0-1.0.15-0.34.1.s390x",
"product": {
"name": "nginx-1.0-1.0.15-0.34.1.s390x",
"product_id": "nginx-1.0-1.0.15-0.34.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nginx-1.0-1.0.15-0.34.1.x86_64",
"product": {
"name": "nginx-1.0-1.0.15-0.34.1.x86_64",
"product_id": "nginx-1.0-1.0.15-0.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Lifecycle Management Server 1.3",
"product": {
"name": "SUSE Lifecycle Management Server 1.3",
"product_id": "SUSE Lifecycle Management Server 1.3",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-slms:1.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Studio Onsite 1.3",
"product": {
"name": "SUSE Studio Onsite 1.3",
"product_id": "SUSE Studio Onsite 1.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-studioonsite:1.3"
}
}
},
{
"category": "product_name",
"name": "SUSE WebYast 1.3",
"product": {
"name": "SUSE WebYast 1.3",
"product_id": "SUSE WebYast 1.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:webyast:1.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1.0-1.0.15-0.34.1.x86_64 as component of SUSE Lifecycle Management Server 1.3",
"product_id": "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.34.1.x86_64"
},
"product_reference": "nginx-1.0-1.0.15-0.34.1.x86_64",
"relates_to_product_reference": "SUSE Lifecycle Management Server 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1.0-1.0.15-0.34.1.x86_64 as component of SUSE Studio Onsite 1.3",
"product_id": "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.34.1.x86_64"
},
"product_reference": "nginx-1.0-1.0.15-0.34.1.x86_64",
"relates_to_product_reference": "SUSE Studio Onsite 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1.0-1.0.15-0.34.1.i586 as component of SUSE WebYast 1.3",
"product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.i586"
},
"product_reference": "nginx-1.0-1.0.15-0.34.1.i586",
"relates_to_product_reference": "SUSE WebYast 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1.0-1.0.15-0.34.1.ia64 as component of SUSE WebYast 1.3",
"product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ia64"
},
"product_reference": "nginx-1.0-1.0.15-0.34.1.ia64",
"relates_to_product_reference": "SUSE WebYast 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1.0-1.0.15-0.34.1.ppc64 as component of SUSE WebYast 1.3",
"product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ppc64"
},
"product_reference": "nginx-1.0-1.0.15-0.34.1.ppc64",
"relates_to_product_reference": "SUSE WebYast 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1.0-1.0.15-0.34.1.s390x as component of SUSE WebYast 1.3",
"product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.s390x"
},
"product_reference": "nginx-1.0-1.0.15-0.34.1.s390x",
"relates_to_product_reference": "SUSE WebYast 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nginx-1.0-1.0.15-0.34.1.x86_64 as component of SUSE WebYast 1.3",
"product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.x86_64"
},
"product_reference": "nginx-1.0-1.0.15-0.34.1.x86_64",
"relates_to_product_reference": "SUSE WebYast 1.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-1000105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1000105"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.34.1.x86_64",
"SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.34.1.x86_64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.i586",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ia64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ppc64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.s390x",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1000105",
"url": "https://www.suse.com/security/cve/CVE-2016-1000105"
},
{
"category": "external",
"summary": "SUSE Bug 988484 for CVE-2016-1000105",
"url": "https://bugzilla.suse.com/988484"
},
{
"category": "external",
"summary": "SUSE Bug 988486 for CVE-2016-1000105",
"url": "https://bugzilla.suse.com/988486"
},
{
"category": "external",
"summary": "SUSE Bug 988487 for CVE-2016-1000105",
"url": "https://bugzilla.suse.com/988487"
},
{
"category": "external",
"summary": "SUSE Bug 988488 for CVE-2016-1000105",
"url": "https://bugzilla.suse.com/988488"
},
{
"category": "external",
"summary": "SUSE Bug 988489 for CVE-2016-1000105",
"url": "https://bugzilla.suse.com/988489"
},
{
"category": "external",
"summary": "SUSE Bug 988491 for CVE-2016-1000105",
"url": "https://bugzilla.suse.com/988491"
},
{
"category": "external",
"summary": "SUSE Bug 988492 for CVE-2016-1000105",
"url": "https://bugzilla.suse.com/988492"
},
{
"category": "external",
"summary": "SUSE Bug 989174 for CVE-2016-1000105",
"url": "https://bugzilla.suse.com/989174"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.34.1.x86_64",
"SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.34.1.x86_64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.i586",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ia64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ppc64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.s390x",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-17T17:04:53Z",
"details": "moderate"
}
],
"title": "CVE-2016-1000105"
},
{
"cve": "CVE-2016-4450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4450"
}
],
"notes": [
{
"category": "general",
"text": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.34.1.x86_64",
"SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.34.1.x86_64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.i586",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ia64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ppc64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.s390x",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4450",
"url": "https://www.suse.com/security/cve/CVE-2016-4450"
},
{
"category": "external",
"summary": "SUSE Bug 982484 for CVE-2016-4450",
"url": "https://bugzilla.suse.com/982484"
},
{
"category": "external",
"summary": "SUSE Bug 982505 for CVE-2016-4450",
"url": "https://bugzilla.suse.com/982505"
},
{
"category": "external",
"summary": "SUSE Bug 982507 for CVE-2016-4450",
"url": "https://bugzilla.suse.com/982507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.34.1.x86_64",
"SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.34.1.x86_64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.i586",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ia64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ppc64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.s390x",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.34.1.x86_64",
"SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.34.1.x86_64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.i586",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ia64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ppc64",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.s390x",
"SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-01-17T17:04:53Z",
"details": "moderate"
}
],
"title": "CVE-2016-4450"
}
]
}
WID-SEC-W-2025-2522
Vulnerability from csaf_certbund - Published: 2016-07-18 22:00 - Updated: 2025-11-10 23:00Summary
Mehrere Webserver: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
PHP ist eine Programmiersprache, die zur Implementierung von Web-Applikationen genutzt wird.
Apache Tomcat ist ein Web-Applikationsserver für verschiedene Plattformen.
Apache ist ein Webserver für verschiedene Plattformen.
Python ist eine universelle, üblicherweise interpretierte höhere Programmiersprache.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in mehreren Webserver Produkten ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "PHP ist eine Programmiersprache, die zur Implementierung von Web-Applikationen genutzt wird.\r\nApache Tomcat ist ein Web-Applikationsserver f\u00fcr verschiedene Plattformen.\r\nApache ist ein Webserver f\u00fcr verschiedene Plattformen.\r\nPython ist eine universelle, \u00fcblicherweise interpretierte h\u00f6here Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in mehreren Webserver Produkten ausnutzen, um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2522 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2025-2522.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2522 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2522"
},
{
"category": "external",
"summary": "Meldung auf httpoxy.org vom 2016-07-18",
"url": "https://httpoxy.org/"
},
{
"category": "external",
"summary": "Cert.org Vulnerability Note VU#797896 vom 2016-07-18",
"url": "http://www.kb.cert.org/vuls/id/797896"
},
{
"category": "external",
"summary": "Microsoft Knowledge Base article #3179800 vom 2016-07-18",
"url": "https://support.microsoft.com/en-us/kb/3179800"
},
{
"category": "external",
"summary": "Meldung auf nginx.com vom 2016-07-18",
"url": "https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/"
},
{
"category": "external",
"summary": "Meldung auf Apache.org vom 2016-07-18",
"url": "https://www.apache.org/security/asf-httpoxy-response.txt"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3038-1 vom 2016-07-18",
"url": "http://www.ubuntu.com/usn/usn-3038-1/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1420 vom 2016-07-18",
"url": "https://access.redhat.com/errata/RHSA-2016:1420"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1421 vom 2016-07-18",
"url": "https://access.redhat.com/errata/RHSA-2016:1421"
},
{
"category": "external",
"summary": "Red Hat Bugzilla #1353755 vom 2016-07-18",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-5387"
},
{
"category": "external",
"summary": "Debian Security Tracker CVE-2016-5387 vom 2016-07-18",
"url": "https://security-tracker.debian.org/tracker/CVE-2016-5387"
},
{
"category": "external",
"summary": "Meldung auf der oss-sec Mailliste vom 2016-07-19",
"url": "http://seclists.org/oss-sec/2016/q3/94"
},
{
"category": "external",
"summary": "CentOS Announce CESA-2016:1421 vom 2016-07-18",
"url": "http://permalink.gmane.org/gmane.linux.centos.announce/9976"
},
{
"category": "external",
"summary": "CentOS Announce CESA-2016:1422 vom 2016-07-18",
"url": "http://permalink.gmane.org/gmane.linux.centos.announce/9975"
},
{
"category": "external",
"summary": "Meldung auf der oss-sec Mailliste vom 2016-07-19",
"url": "http://seclists.org/oss-sec/2016/q3/95"
},
{
"category": "external",
"summary": "Typo3 Core Security Advisory typo3-core-sa-2016-019 vom 2016-07-19",
"url": "https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-019/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-3623-1 vom 2016-07-20",
"url": "https://lists.debian.org/debian-security-announce/2016/msg00201.html"
},
{
"category": "external",
"summary": "SUSE Patch vom 2016-07-20",
"url": "https://download.suse.com/patch/finder/?keywords=a513b952ed04bce0c2391eb2ba3b9f2c"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-3631 vom 2016-07-27",
"url": "https://www.debian.org/security/2016/dsa-3631"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3045-1 vom 2016-08-02",
"url": "http://www.ubuntu.com/usn/usn-3045-1/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1538 vom 2016-08-03",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1538.html"
},
{
"category": "external",
"summary": "Unify Security Advisory Report - OBSO-1607-01 vom 2016-07-27",
"url": "https://networks.unify.com/security/advisories/OBSO-1607-01.pdf"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1609 vom 2016-08-12",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1609.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1610 vom 2016-08-12",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1610.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1611 vom 2016-08-12",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1611.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1612 vom 2016-08-12",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1612.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1613 vom 2016-08-12",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1613.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2016:2090 vom 2016-08-17",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2016-August/002213.html"
},
{
"category": "external",
"summary": "RedHat Security Advisory RHSA-2016-1624",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1624.html"
},
{
"category": "external",
"summary": "RedHat Security Advisory RHSA-2016-1625",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1625.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1630-1 vom 2016-08-18",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1630.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1629-1 vom 2016-08-18",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1629.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1628-1 vom 2016-08-18",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1628.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1627-1 vom 2016-08-18",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1627.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1626-1 vom 2016-08-18",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1626.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2016:2106-1 vom 2016-08-19",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1650-1 vom 2016-08-22",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1650.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1649-1 vom 2016-08-22",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1649.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1648-1 vom 2016-08-22",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1648.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2016:2188-1 vom 2016-09-03",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162188-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2016:2229-1 vom 2016-09-07",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162229-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2016:2270-1 vom 2016-09-10",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162270-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2016:1978 vom 2016-09-30",
"url": "https://access.redhat.com/errata/RHSA-2016:1978"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2016:2653-1 vom 2016-10-26",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162653-1.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPSBUX03665 vom 2016-11-07",
"url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05324759"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2016-2586 vom 2016-11-09",
"url": "http://linux.oracle.com/errata/ELSA-2016-2586.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2016-2598 vom 2016-11-09",
"url": "http://linux.oracle.com/errata/ELSA-2016-2598.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2016:2859-1 vom 2016-11-18",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162859-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3134-1 vom 2016-11-23",
"url": "http://www.ubuntu.com/usn/usn-3134-1/"
},
{
"category": "external",
"summary": "Eintrag auf Apache.org",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2017:0114-1 vom 2017-01-12",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170114-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2017:0190-1 vom 2017-01-18",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170190-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3177-1 vom 2017-01-23",
"url": "http://www.ubuntu.com/usn/usn-3177-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3177-2 vom 2017-02-02",
"url": "http://www.ubuntu.com/usn/usn-3177-2/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2017:1632-1 vom 2017-06-21",
"url": "https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2017:1660-1 vom 2017-06-24",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171660-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:0273 vom 2018-02-05",
"url": "https://access.redhat.com/errata/RHSA-2018:0273"
},
{
"category": "external",
"summary": "Dell/EMC Knowledge Base Article: 000529947",
"url": "https://support.emc.com/kb/529947"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0223-1 vom 2019-02-01",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190223-1.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15706-1 vom 2025-11-07",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2YFYRHG3D4WKV5P6XA25CFPNSEBUKHC/"
}
],
"source_lang": "en-US",
"title": "Mehrere Webserver: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen",
"tracking": {
"current_release_date": "2025-11-10T23:00:00.000+00:00",
"generator": {
"date": "2025-11-11T06:37:21.182+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-2522",
"initial_release_date": "2016-07-18T22:00:00.000+00:00",
"revision_history": [
{
"date": "2016-07-18T22:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2016-07-18T22:00:00.000+00:00",
"number": "2",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-07-18T22:00:00.000+00:00",
"number": "3",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-07-18T22:00:00.000+00:00",
"number": "4",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-07-19T22:00:00.000+00:00",
"number": "5",
"summary": "New remediations available"
},
{
"date": "2016-07-20T22:00:00.000+00:00",
"number": "6",
"summary": "New remediations available"
},
{
"date": "2016-07-20T22:00:00.000+00:00",
"number": "7",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-07-27T22:00:00.000+00:00",
"number": "8",
"summary": "New remediations available"
},
{
"date": "2016-07-27T22:00:00.000+00:00",
"number": "9",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-08-02T22:00:00.000+00:00",
"number": "10",
"summary": "New remediations available"
},
{
"date": "2016-08-02T22:00:00.000+00:00",
"number": "11",
"summary": "New remediations available"
},
{
"date": "2016-08-02T22:00:00.000+00:00",
"number": "12",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-08-11T22:00:00.000+00:00",
"number": "13",
"summary": "New remediations available"
},
{
"date": "2016-08-11T22:00:00.000+00:00",
"number": "14",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-08-11T22:00:00.000+00:00",
"number": "15",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-08-11T22:00:00.000+00:00",
"number": "16",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-08-11T22:00:00.000+00:00",
"number": "17",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-08-17T22:00:00.000+00:00",
"number": "18",
"summary": "New remediations available"
},
{
"date": "2016-08-17T22:00:00.000+00:00",
"number": "19",
"summary": "New remediations available"
},
{
"date": "2016-08-17T22:00:00.000+00:00",
"number": "20",
"summary": "New remediations available"
},
{
"date": "2016-08-18T22:00:00.000+00:00",
"number": "21",
"summary": "New remediations available"
},
{
"date": "2016-08-18T22:00:00.000+00:00",
"number": "22",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-08-21T22:00:00.000+00:00",
"number": "23",
"summary": "New remediations available"
},
{
"date": "2016-08-21T22:00:00.000+00:00",
"number": "24",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-08-22T22:00:00.000+00:00",
"number": "25",
"summary": "New remediations available"
},
{
"date": "2016-08-22T22:00:00.000+00:00",
"number": "26",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-08-22T22:00:00.000+00:00",
"number": "27",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-09-04T22:00:00.000+00:00",
"number": "28",
"summary": "New remediations available"
},
{
"date": "2016-09-04T22:00:00.000+00:00",
"number": "29",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-09-06T22:00:00.000+00:00",
"number": "30",
"summary": "New remediations available"
},
{
"date": "2016-09-11T22:00:00.000+00:00",
"number": "31",
"summary": "New remediations available"
},
{
"date": "2016-10-03T22:00:00.000+00:00",
"number": "32",
"summary": "New remediations available"
},
{
"date": "2016-10-03T22:00:00.000+00:00",
"number": "33",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-10-03T22:00:00.000+00:00",
"number": "34",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-10-03T22:00:00.000+00:00",
"number": "35",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-10-03T22:00:00.000+00:00",
"number": "36",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-10-03T22:00:00.000+00:00",
"number": "37",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-10-26T22:00:00.000+00:00",
"number": "38",
"summary": "New remediations available"
},
{
"date": "2016-11-06T23:00:00.000+00:00",
"number": "39",
"summary": "New remediations available"
},
{
"date": "2016-11-06T23:00:00.000+00:00",
"number": "40",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-11-09T23:00:00.000+00:00",
"number": "41",
"summary": "New remediations available"
},
{
"date": "2016-11-20T23:00:00.000+00:00",
"number": "42",
"summary": "New remediations available"
},
{
"date": "2016-11-22T23:00:00.000+00:00",
"number": "43",
"summary": "New remediations available"
},
{
"date": "2016-11-22T23:00:00.000+00:00",
"number": "44",
"summary": "Version nicht vorhanden"
},
{
"date": "2016-12-20T23:00:00.000+00:00",
"number": "45",
"summary": "New remediations available"
},
{
"date": "2017-01-12T23:00:00.000+00:00",
"number": "46",
"summary": "New remediations available"
},
{
"date": "2017-01-18T23:00:00.000+00:00",
"number": "47",
"summary": "New remediations available"
},
{
"date": "2017-01-23T23:00:00.000+00:00",
"number": "48",
"summary": "New remediations available"
},
{
"date": "2017-02-02T23:00:00.000+00:00",
"number": "49",
"summary": "New remediations available"
},
{
"date": "2017-06-20T22:00:00.000+00:00",
"number": "50",
"summary": "New remediations available"
},
{
"date": "2017-06-20T22:00:00.000+00:00",
"number": "51",
"summary": "New remediations available"
},
{
"date": "2017-06-20T22:00:00.000+00:00",
"number": "52",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-06-26T22:00:00.000+00:00",
"number": "53",
"summary": "New remediations available"
},
{
"date": "2017-08-07T22:00:00.000+00:00",
"number": "54",
"summary": "Added references"
},
{
"date": "2019-01-30T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von EMC aufgenommen"
},
{
"date": "2019-02-03T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-04-08T22:00:00.000+00:00",
"number": "57",
"summary": "Referenz(en) aufgenommen: FEDORA-2019-AA7F37CD4D"
},
{
"date": "2025-11-09T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "59",
"summary": "Korrektur"
}
],
"status": "final",
"version": "59"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Apache HTTP Server",
"product": {
"name": "Apache HTTP Server",
"product_id": "67869",
"product_identification_helper": {
"cpe": "cpe:/a:apache:http_server:-"
}
}
},
{
"category": "product_name",
"name": "Apache Tomcat",
"product": {
"name": "Apache Tomcat",
"product_id": "643",
"product_identification_helper": {
"cpe": "cpe:/a:apache:tomcat:-"
}
}
}
],
"category": "vendor",
"name": "Apache"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "EMC VNX1",
"product": {
"name": "EMC VNX1",
"product_id": "T004667",
"product_identification_helper": {
"cpe": "cpe:/h:emc:vnx:-"
}
}
}
],
"category": "vendor",
"name": "EMC"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE HP-UX",
"product": {
"name": "HPE HP-UX",
"product_id": "4871",
"product_identification_helper": {
"cpe": "cpe:/o:hp:hp-ux:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source PHP",
"product": {
"name": "Open Source PHP",
"product_id": "8746",
"product_identification_helper": {
"cpe": "cpe:/a:php:php:-"
}
}
},
{
"category": "product_name",
"name": "Open Source Python",
"product": {
"name": "Open Source Python",
"product_id": "113051",
"product_identification_helper": {
"cpe": "cpe:/a:python:python:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server",
"product": {
"name": "Red Hat JBoss Web Server",
"product_id": "T003426",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "12 SP1",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "T006804",
"product_identification_helper": {
"cpe": "cpe:/o:suse:linux_enterprise_desktop:12:sp1"
}
}
}
],
"category": "product_name",
"name": "Linux Enterprise Desktop"
},
{
"branches": [
{
"category": "product_version",
"name": "12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1",
"product_id": "T007836",
"product_identification_helper": {
"cpe": "cpe:/o:suse:linux_enterprise_server:12:sp1"
}
}
}
],
"category": "product_name",
"name": "Linux Enterprise Server"
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.2.1",
"product": {
"name": "TYPO3 Core \u003c8.2.1",
"product_id": "T008046"
}
},
{
"category": "product_version",
"name": "8.2.1",
"product": {
"name": "TYPO3 Core 8.2.1",
"product_id": "T008046-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:typo3:typo3:8.2.1"
}
}
}
],
"category": "product_name",
"name": "Core"
}
],
"category": "vendor",
"name": "TYPO3"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "131442",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:10.04:-:lts"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-1000104",
"product_status": {
"known_affected": [
"131442",
"67646",
"4871",
"T004667",
"67869",
"T003426",
"T007836",
"T006804",
"2951",
"T002207",
"643",
"T027843",
"8746",
"1727",
"T008046",
"113051"
]
},
"release_date": "2016-07-18T22:00:00.000+00:00",
"title": "CVE-2016-1000104"
},
{
"cve": "CVE-2016-1000105",
"product_status": {
"known_affected": [
"131442",
"67646",
"4871",
"T004667",
"67869",
"T003426",
"T007836",
"T006804",
"2951",
"T002207",
"643",
"T027843",
"8746",
"1727",
"T008046",
"113051"
]
},
"release_date": "2016-07-18T22:00:00.000+00:00",
"title": "CVE-2016-1000105"
},
{
"cve": "CVE-2016-1000107",
"product_status": {
"known_affected": [
"131442",
"67646",
"4871",
"T004667",
"67869",
"T003426",
"T007836",
"T006804",
"2951",
"T002207",
"643",
"T027843",
"8746",
"1727",
"T008046",
"113051"
]
},
"release_date": "2016-07-18T22:00:00.000+00:00",
"title": "CVE-2016-1000107"
},
{
"cve": "CVE-2016-1000108",
"product_status": {
"known_affected": [
"131442",
"67646",
"4871",
"T004667",
"67869",
"T003426",
"T007836",
"T006804",
"2951",
"T002207",
"643",
"T027843",
"8746",
"1727",
"T008046",
"113051"
]
},
"release_date": "2016-07-18T22:00:00.000+00:00",
"title": "CVE-2016-1000108"
},
{
"cve": "CVE-2016-1000109",
"product_status": {
"known_affected": [
"131442",
"67646",
"4871",
"T004667",
"67869",
"T003426",
"T007836",
"T006804",
"2951",
"T002207",
"643",
"T027843",
"8746",
"1727",
"T008046",
"113051"
]
},
"release_date": "2016-07-18T22:00:00.000+00:00",
"title": "CVE-2016-1000109"
},
{
"cve": "CVE-2016-1000110",
"product_status": {
"known_affected": [
"131442",
"67646",
"4871",
"T004667",
"67869",
"T003426",
"T007836",
"T006804",
"2951",
"T002207",
"643",
"T027843",
"8746",
"1727",
"T008046",
"113051"
]
},
"release_date": "2016-07-18T22:00:00.000+00:00",
"title": "CVE-2016-1000110"
},
{
"cve": "CVE-2016-1000111",
"product_status": {
"known_affected": [
"131442",
"67646",
"4871",
"T004667",
"67869",
"T003426",
"T007836",
"T006804",
"2951",
"T002207",
"643",
"T027843",
"8746",
"1727",
"T008046",
"113051"
]
},
"release_date": "2016-07-18T22:00:00.000+00:00",
"title": "CVE-2016-1000111"
},
{
"cve": "CVE-2016-5385",
"product_status": {
"known_affected": [
"131442",
"67646",
"4871",
"T004667",
"67869",
"T003426",
"T007836",
"T006804",
"2951",
"T002207",
"643",
"T027843",
"8746",
"1727",
"T008046",
"113051"
]
},
"release_date": "2016-07-18T22:00:00.000+00:00",
"title": "CVE-2016-5385"
},
{
"cve": "CVE-2016-5386",
"product_status": {
"known_affected": [
"131442",
"67646",
"4871",
"T004667",
"67869",
"T003426",
"T007836",
"T006804",
"2951",
"T002207",
"643",
"T027843",
"8746",
"1727",
"T008046",
"113051"
]
},
"release_date": "2016-07-18T22:00:00.000+00:00",
"title": "CVE-2016-5386"
},
{
"cve": "CVE-2016-5387",
"product_status": {
"known_affected": [
"131442",
"67646",
"4871",
"T004667",
"67869",
"T003426",
"T007836",
"T006804",
"2951",
"T002207",
"643",
"T027843",
"8746",
"1727",
"T008046",
"113051"
]
},
"release_date": "2016-07-18T22:00:00.000+00:00",
"title": "CVE-2016-5387"
},
{
"cve": "CVE-2016-5388",
"product_status": {
"known_affected": [
"131442",
"67646",
"4871",
"T004667",
"67869",
"T003426",
"T007836",
"T006804",
"2951",
"T002207",
"643",
"T027843",
"8746",
"1727",
"T008046",
"113051"
]
},
"release_date": "2016-07-18T22:00:00.000+00:00",
"title": "CVE-2016-5388"
}
]
}
CNVD-2016-06085
Vulnerability from cnvd - Published: 2016-08-05
VLAI Severity ?
Title
nginx CGI应用程序重定向漏洞
Description
nginx是俄罗斯软件开发者Igor Sysoev所研发的一款HTTP和反向代理服务器,也可以作为邮件代理服务器。CGI Application是其中的一个轻量级的Web应用开发的MVC框架。
nginx CGI应用程序中存在重定向漏洞。远程攻击者利用该漏洞将目标CGI应用程序请求重定向到任意Web代理。
Severity
中
Patch Name
nginx CGI应用程序重定向漏洞的补丁
Patch Description
nginx是俄罗斯软件开发者Igor Sysoev所研发的一款HTTP和反向代理服务器,也可以作为邮件代理服务器。CGI Application是其中的一个轻量级的Web应用开发的MVC框架。
nginx CGI应用程序中存在重定向漏洞。远程攻击者利用该漏洞将目标CGI应用程序请求重定向到任意Web代理。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/
Reference
http://securitytracker.com/id/1036334
https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/
Impacted products
| Name | nginx CGI |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2016-1000105"
}
},
"description": "nginx\u662f\u4fc4\u7f57\u65af\u8f6f\u4ef6\u5f00\u53d1\u8005Igor Sysoev\u6240\u7814\u53d1\u7684\u4e00\u6b3eHTTP\u548c\u53cd\u5411\u4ee3\u7406\u670d\u52a1\u5668\uff0c\u4e5f\u53ef\u4ee5\u4f5c\u4e3a\u90ae\u4ef6\u4ee3\u7406\u670d\u52a1\u5668\u3002CGI Application\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u8f7b\u91cf\u7ea7\u7684Web\u5e94\u7528\u5f00\u53d1\u7684MVC\u6846\u67b6\u3002\r\n\r\nnginx CGI\u5e94\u7528\u7a0b\u5e8f\u4e2d\u5b58\u5728\u91cd\u5b9a\u5411\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u76ee\u6807CGI\u5e94\u7528\u7a0b\u5e8f\u8bf7\u6c42\u91cd\u5b9a\u5411\u5230\u4efb\u610fWeb\u4ee3\u7406\u3002",
"discovererName": "unknown",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-06085",
"openTime": "2016-08-05",
"patchDescription": "nginx\u662f\u4fc4\u7f57\u65af\u8f6f\u4ef6\u5f00\u53d1\u8005Igor Sysoev\u6240\u7814\u53d1\u7684\u4e00\u6b3eHTTP\u548c\u53cd\u5411\u4ee3\u7406\u670d\u52a1\u5668\uff0c\u4e5f\u53ef\u4ee5\u4f5c\u4e3a\u90ae\u4ef6\u4ee3\u7406\u670d\u52a1\u5668\u3002CGI Application\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u8f7b\u91cf\u7ea7\u7684Web\u5e94\u7528\u5f00\u53d1\u7684MVC\u6846\u67b6\u3002\r\n\r\nnginx CGI\u5e94\u7528\u7a0b\u5e8f\u4e2d\u5b58\u5728\u91cd\u5b9a\u5411\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u76ee\u6807CGI\u5e94\u7528\u7a0b\u5e8f\u8bf7\u6c42\u91cd\u5b9a\u5411\u5230\u4efb\u610fWeb\u4ee3\u7406\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "nginx CGI\u5e94\u7528\u7a0b\u5e8f\u91cd\u5b9a\u5411\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "nginx CGI"
},
"referenceLink": "http://securitytracker.com/id/1036334\r\nhttps://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/",
"serverity": "\u4e2d",
"submitTime": "2016-08-04",
"title": "nginx CGI\u5e94\u7528\u7a0b\u5e8f\u91cd\u5b9a\u5411\u6f0f\u6d1e"
}
FKIE_CVE-2016-1000105
Vulnerability from fkie_nvd - Published: 2020-01-31 22:15 - Updated: 2023-11-07 02:29
Severity ?
Summary
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
References
| URL | Tags |
|---|
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none"
}
],
"id": "CVE-2016-1000105",
"lastModified": "2023-11-07T02:29:26.130",
"metrics": {},
"published": "2020-01-31T22:15:11.370",
"references": [],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Rejected"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…