It was discovered that the Apache HTTP Server would set the HTTPPROXY environment variable based on the contents of the Proxy header from HTTP requests. A remote attacker could possibly use this issue in combination with CGI scripts that honour the HTTPPROXY variable to redirect outgoing HTTP requests.
{ "availability": "No subscription required", "binaries": [ { "apache2-suexec": "2.4.7-1ubuntu4.13", "apache2-suexec-pristine-dbgsym": "2.4.7-1ubuntu4.13", "libapache2-mod-proxy-html": "1:2.4.7-1ubuntu4.13", "apache2-dev": "2.4.7-1ubuntu4.13", "apache2-bin": "2.4.7-1ubuntu4.13", "apache2-suexec-custom": "2.4.7-1ubuntu4.13", "apache2-suexec-pristine": "2.4.7-1ubuntu4.13", "apache2-doc": "2.4.7-1ubuntu4.13", "apache2-mpm-event": "2.4.7-1ubuntu4.13", "apache2": "2.4.7-1ubuntu4.13", "apache2-dbg": "2.4.7-1ubuntu4.13", "apache2-utils-dbgsym": "2.4.7-1ubuntu4.13", "apache2-data": "2.4.7-1ubuntu4.13", "apache2-mpm-prefork": "2.4.7-1ubuntu4.13", "apache2-mpm-itk": "2.4.7-1ubuntu4.13", "libapache2-mod-macro": "1:2.4.7-1ubuntu4.13", "apache2-suexec-custom-dbgsym": "2.4.7-1ubuntu4.13", "apache2.2-bin": "2.4.7-1ubuntu4.13", "apache2-bin-dbgsym": "2.4.7-1ubuntu4.13", "apache2-utils": "2.4.7-1ubuntu4.13", "apache2-mpm-worker": "2.4.7-1ubuntu4.13" } ] }
{ "availability": "No subscription required", "binaries": [ { "apache2-suexec-pristine-dbgsym": "2.4.18-2ubuntu3.1", "apache2-dev": "2.4.18-2ubuntu3.1", "apache2-bin": "2.4.18-2ubuntu3.1", "apache2-suexec-pristine": "2.4.18-2ubuntu3.1", "apache2-doc": "2.4.18-2ubuntu3.1", "apache2": "2.4.18-2ubuntu3.1", "apache2-dev-dbgsym": "2.4.18-2ubuntu3.1", "apache2-dbg": "2.4.18-2ubuntu3.1", "apache2-utils-dbgsym": "2.4.18-2ubuntu3.1", "apache2-data": "2.4.18-2ubuntu3.1", "apache2-dbgsym": "2.4.18-2ubuntu3.1", "apache2-suexec-custom-dbgsym": "2.4.18-2ubuntu3.1", "apache2-bin-dbgsym": "2.4.18-2ubuntu3.1", "apache2-utils": "2.4.18-2ubuntu3.1", "apache2-suexec-custom": "2.4.18-2ubuntu3.1" } ] }