It was discovered that httpd used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.
Unitrends risk assessment: High
For CentOS6, resolved in httpd-2.2.15-54.el6 included in the latest security update
For CentOS5, resolved in httpd-2.2.3-92.el5_11, not included. Migrate to CentOS6.
LINK TO ADVISORIES