Bug 1287577 (CVE-2015-8400) - CVE-2015-8400 shellinabox: DNS rebinding attack due to HTTP fallback
Summary: CVE-2015-8400 shellinabox: DNS rebinding attack due to HTTP fallback
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2015-8400
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1287578 1287579
Blocks:
TreeView+ depends on / blocked
 
Reported: 2015-12-02 11:32 UTC by Martin Prpič
Modified: 2019-09-29 13:40 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-02-22 20:41:28 UTC
Embargoed:


Attachments (Terms of Use)

Description Martin Prpič 2015-12-02 11:32:27 UTC
The shellinabox server, while using the HTTPS protocol, allows HTTP fallback through the "/plain" URL.

Upstream issue:

https://github.com/shellinabox/shellinabox/issues/355

Original report:

http://www.openwall.com/lists/oss-security/2015/12/02/6

Comment 1 Martin Prpič 2015-12-02 11:32:55 UTC
Created shellinabox tracking bugs for this issue:

Affects: fedora-all [bug 1287578]
Affects: epel-all [bug 1287579]


Note You need to log in before you can comment on or make changes to this bug.