{"id":"CVE-2016-1000107","details":"inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue.","modified":"2026-04-10T03:32:32.823951Z","published":"2019-12-10T18:15:09.140Z","related":["openSUSE-SU-2025:15706-1"],"references":[{"type":"ADVISORY","url":"https://httpoxy.org/"},{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2016-1000107"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/07/18/6"},{"type":"REPORT","url":"https://bugs.erlang.org/browse/ERL-198"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/erlang/otp","events":[{"introduced":"0"},{"last_affected":"e62a389ce5dd27e7b26802243a5565ffd1feaef0"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"22.1"}]}}],"versions":["OTP-17.0","OTP-18.0","OTP-18.0-rc1","OTP-19.0","OTP-19.0-rc1","OTP-19.0-rc2","OTP-20.0","OTP-20.0-rc1","OTP-20.0-rc2","OTP-21.0","OTP-21.0-rc1","OTP-21.0-rc2","OTP-22.0","OTP-22.0-rc1","OTP-22.0-rc2","OTP-22.0-rc3","OTP-22.1","OTP_17.0-rc1","OTP_17.0-rc2","OTP_R13B03","OTP_R13B04","OTP_R14A","OTP_R14B","OTP_R14B01","OTP_R14B02","OTP_R14B03","OTP_R15A","OTP_R15B","OTP_R16A_RELEASE_CANDIDATE","OTP_R16B"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-1000107.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}