ALAS-2016-760

Related Vulnerabilities: CVE-2016-1000111  

It was discovered that python-twisted-web used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.

ALAS-2016-760


Amazon Linux AMI Security Advisory: ALAS-2016-760
Advisory Release Date: 2016-10-27 17:00 Pacific
Advisory Updated Date: 2016-10-27 17:00 Pacific
Severity: Important
References: CVE-2016-1000111 

Issue Overview:

It was discovered that python-twisted-web used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.


Affected Packages:

python-twisted-web


Issue Correction:
Run yum update python-twisted-web to update your system.

New Packages:
i686:
    python26-twisted-web-8.2.0-5.5.amzn1.i686
    python27-twisted-web-8.2.0-5.5.amzn1.i686

src:
    python-twisted-web-8.2.0-5.5.amzn1.src

x86_64:
    python27-twisted-web-8.2.0-5.5.amzn1.x86_64
    python26-twisted-web-8.2.0-5.5.amzn1.x86_64