Microsoft Corporation Information for VU#797896

CGI web servers assign Proxy header values from client requests to internal HTTP_PROXY environment variables

Status

Affected

Vendor Statement

If you have installed PHP or any other third party framework on top of IIS, we recommend applying mitigation steps to protect from malicious Redirection or MiM attacks.

    Mitigation:

    Update apphost.config with the following rule:

    <system.webServer>

    <rewrite>

    <rules>

    <rule name=3D"Erase HTTP_PROXY" patternSyntax=3D"Wildcard">

    <match url=3D"*.*" />

    <serverVariables>

    <set name=3D"HTTP_PROXY" value=3D"" />

    </serverVariables>

    <action type=3D"None" />

    </rule>

    </rules>

    </rewrite>

    </system.webServer>

    Vendor Information

    We are not aware of further vendor information regarding this vulnerability.

    Vendor References

    None

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.