logo

CVE-2015-7519 passenger

Package

Manager: gem
Name: passenger
Vulnerable Version: >=0 <4.0.60 || >=5.0.0 <5.0.22

Severity

Level: Low

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00443 pctl0.62429

Details

Phusion Passenger allows remote attackers to spoof headers `agent/Core/Controller/SendRequest.cpp` in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an `_` (underscore) character instead of a `-` (dash) character in an HTTP header, as demonstrated by an `X_User` header.

Metadata

Created: 2018-10-10T17:29:13Z
Modified: 2023-07-05T18:39:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-fxwv-953p-7qpf/GHSA-fxwv-953p-7qpf.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-fxwv-953p-7qpf
Finding: F184
Auto approve: 1