Search for vulnerabilities
Vulnerability details: VCID-rmb8-9sp1-aaac
Vulnerability ID VCID-rmb8-9sp1-aaac
Aliases CVE-2016-1000111
GHSA-3gqj-cmxr-p4x2
PYSEC-2020-214
Summary Twisted before 16.3.1 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
generic_textual Low http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1000111.html
rhas Important https://access.redhat.com/errata/RHSA-2016:1978
rhas Important https://access.redhat.com/errata/RHSA-2018:0273
cvssv3 5.0 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000111.json
epss 0.00269 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00269 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00269 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00269 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00396 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00396 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00396 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00396 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00396 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00396 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00396 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00396 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00396 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00396 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00396 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.00584 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
epss 0.01512 https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1357345
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000111
cvssv2 6.4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-3gqj-cmxr-p4x2
cvssv3.1 5.3 https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2020-214.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2020-214.yaml
cvssv3.1 5.3 https://github.com/twisted/twisted
cvssv3.1 6.1 https://github.com/twisted/twisted
generic_textual MODERATE https://github.com/twisted/twisted
generic_textual Low https://marc.info/?l=oss-security&m=146885145004975&w=2
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2016-1000111
cvssv3 5.3 https://nvd.nist.gov/vuln/detail/CVE-2016-1000111
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2016-1000111
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2016-1000111
cvssv3.1 5.3 https://twistedmatrix.com/pipermail/twisted-web/2016-August/005268.html
generic_textual MODERATE https://twistedmatrix.com/pipermail/twisted-web/2016-August/005268.html
cvssv3.1 5.3 https://twistedmatrix.com/trac/ticket/8623
generic_textual MODERATE https://twistedmatrix.com/trac/ticket/8623
generic_textual Low https://ubuntu.com/security/notices/USN-3585-1
cvssv3.1 5.3 https://www.openwall.com/lists/oss-security/2016/07/18/6
generic_textual MODERATE https://www.openwall.com/lists/oss-security/2016/07/18/6
cvssv3.1 5.3 http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1000111.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000111.json
https://api.first.org/data/v1/epss?cve=CVE-2016-1000111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000111
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2020-214.yaml
https://github.com/twisted/twisted
https://marc.info/?l=oss-security&m=146885145004975&w=2
https://twistedmatrix.com/pipermail/twisted-web/2016-August/005268.html
https://twistedmatrix.com/trac/ticket/8623
https://ubuntu.com/security/notices/USN-3585-1
https://www.openwall.com/lists/oss-security/2016/07/18/6
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
1357345 https://bugzilla.redhat.com/show_bug.cgi?id=1357345
cpe:2.3:a:twistedmatrix:twisted:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:twistedmatrix:twisted:*:*:*:*:*:*:*:*
cpe:2.3:a:twisted:twisted:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:twisted:twisted:*:*:*:*:*:*:*:*
CVE-2016-1000111 https://nvd.nist.gov/vuln/detail/CVE-2016-1000111
GHSA-3gqj-cmxr-p4x2 https://github.com/advisories/GHSA-3gqj-cmxr-p4x2
RHSA-2016:1978 https://access.redhat.com/errata/RHSA-2016:1978
RHSA-2018:0273 https://access.redhat.com/errata/RHSA-2018:0273
USN-3585-1 https://usn.ubuntu.com/3585-1/
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000111.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2020-214.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/twisted/twisted
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/twisted/twisted
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-1000111
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-1000111
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-1000111
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://twistedmatrix.com/pipermail/twisted-web/2016-August/005268.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://twistedmatrix.com/trac/ticket/8623
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.openwall.com/lists/oss-security/2016/07/18/6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.67336
EPSS Score 0.00269
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.