HTTP_PROXY Traffic Redirection

By

Common Gateway Interface (CGI) allows server side scripts to handle client HTTP request through platform independent interface. CGI rules and guidelines are defined in RFC 3875. HTTP is request/response protocol. Client HTTP requests are handled and responded by server. This vulnerability affects application code running in CGI, or CGI-like environments.

HTTP_PROXY is a popular environment variable used to configure an outgoing proxy. Upon receiving request with the Proxy HTTP header, Vulnerable server sets the $HTTP_PROXY environment variable to the value of Proxy HTTP header. Attackers can set the HTTP_PROXY environment variable using the malicious Proxy HTTP header. This allows remote attacker to launch a man-in-the-middle attack by redirecting traffic through controlled proxy.

Dell SonicWALL has researched this vulnerability. The following signature has been created to protect their customers.

  • IPS: 11749 Suspicious HTTP Proxy Header 1
Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.