meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, July 19th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 19 July 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. httpoxy Vulnerability

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, July 19th, 2016 edition of the Sands and its Storm Center's Stormcast.

0:07.8

My name is Johannes Orich, and the time recording from Minneapolis, Minnesota.

0:11.7

And yet again, we got a vulnerability that comes with its own logo, website, and name.

0:18.6

Oxy this time.

0:20.6

Now, this vulnerability deals with how some web application

0:24.8

deal with proxy headers that are being sent by users. The root cause of this issue is that

0:32.8

some web applications use an environment variable HTTP, in order to indicate if outbound

0:40.5

requests should be sent via a specific proxy. Now, this environment variable could potentially

0:47.3

be overwritten depending on how your web application is configured by an proxy header that's being sent by the user.

0:57.3

Because typically, and according to the CGI specification, any header being sent by the user

1:03.5

is converted to an environment variable, HTTP underscore, and then the name of the header.

1:10.0

So if the user sends a proxy header then

1:13.9

the web application framework CGI will create an environment variable

1:19.1

HTTP underscore proxy which then potentially overrides the environment

1:24.6

variable that the application set beforehand, for example, via a

1:30.2

configuration file. And then of course, if a request with such a header trickers an outbound

1:35.6

ATP request, that outbound HTTP request be sent then via the proxy, which could theoretically

1:43.3

lead to interception of the traffic Byn Tacker.

1:47.0

Now applicability of this vulnerability is limited.

1:50.0

They're only very specific frameworks that are vulnerable.

1:54.0

Also, it does depend on the configuration of the particular web application.

2:00.0

If you're running plain CGI, you're more likely

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.