Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 589234 - <www-apps/nextcloud-9.0.53: HTTPoxy vulnerability (CVE-2016-5385)
Summary: <www-apps/nextcloud-9.0.53: HTTPoxy vulnerability (CVE-2016-5385)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://nextcloud.com/httpoxy-can-aff...
Whiteboard: ~4 [noglsa]
Keywords:
Depends on:
Blocks: 589224
  Show dependency tree
 
Reported: 2016-07-20 12:53 UTC by Bernard Cafarelli
Modified: 2016-07-20 13:08 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Bernard Cafarelli gentoo-dev 2016-07-20 12:53:13 UTC
Same vulnerability as www-apps/owncloud in bug #589222

Per $URL:
We ship Guzzle 5 as part of Nextcloud. This handles http requests and supports HTTP_PROXY environment variable which can be abused, in some special scenario’s, by an attacker to read content. In the worst case, when you use the ajax cron feature, an attacker can potentially see external storage credentials and data. We recommend not to use the ajax cron feature but the system cron if possible, as that also improves performance and reliability.

As a precaution and because security and privacy are paramount for our users, we released a security update

New version 9.0.53 is in tree, and older vulnerable versions have been dropped
Comment 1 Aaron Bauman (RETIRED) gentoo-dev 2016-07-20 13:08:56 UTC
(In reply to Bernard Cafarelli from comment #0)
> Same vulnerability as www-apps/owncloud in bug #589222
> 
> Per $URL:
> We ship Guzzle 5 as part of Nextcloud. This handles http requests and
> supports HTTP_PROXY environment variable which can be abused, in some
> special scenario’s, by an attacker to read content. In the worst case, when
> you use the ajax cron feature, an attacker can potentially see external
> storage credentials and data. We recommend not to use the ajax cron feature
> but the system cron if possible, as that also improves performance and
> reliability.
> 
> As a precaution and because security and privacy are paramount for our
> users, we released a security update
> 
> New version 9.0.53 is in tree, and older vulnerable versions have been
> dropped

Bernard, thanks for the quick push and fix!