Apache vulnerability - CVE-2016-5387
- Product: Apache
 - Product Version: 2.2.x and lower
 - Relevant for Installation Type: All environments
 
Ex-Libris is aware of the new apache vulnerability (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387) which involves HTTP_PROXY header and CGI (as described in https://httpoxy.org/).
Several requirements must be fulfilled in order for an environment to be vulnerable:
- Code needs to be running under a CGI-like context, where HTTP_PROXY becomes a real or emulated environment variable
 - An HTTP client that trusts HTTP_PROXY, and configures it as the proxy, must exist
 - That client, used within a request handler, must be making an HTTP (as opposed to HTTPS) request
 
Our research found that:
- In products where code is running under CGI the Perl client (LWP::HTTP) does not use the HTTP_PROXY variable and is therefore considered of low risk.
 - Products running apache tomcat are not running CGI.
 - Other products have no access to the web and are therefore considered of low risk.
 
These conclusions are relevant only to code produced by Ex-Libris. CGI code installed by customers which was not supplied by ExLibris cannot be guaranteed to be safe.
While the risk level of this vulnerability is deemed as LOW for Ex-Libris products, once an official version with the relevant fix is announced by apache, our development team will build and implement it in future releases.
- Article last edited: 25-July-2016
 

