Description
agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 2.2 | Impact: 1.4Attack Vector: Network
Complexity: High
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: None
Integrity: Low
Availability: None
Affected Packages3 packages
🔴Vulnerability Details
4OSVPhusion Passenger allows remote attackers to spoof headers↗2018-10-10 ▶ GHSAPhusion Passenger allows remote attackers to spoof headers↗2018-10-10 ▶ OSVCVE-2015-7519: agent/Core/Controller/SendRequest↗2016-01-08 ▶ CVEListCVE-2015-7519: agent/Core/Controller/SendRequest↗2016-01-08 ▶ 📋Vendor Advisories
2Red Hatpassenger: Header overwriting issue allowing user impersonation↗2015-12-07 ▶ DebianCVE-2015-7519: passenger - agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0...↗2015 ▶ 💬Community
2BugzillaCVE-2015-7519 passenger: Header overwriting issue allowing user impersonation [fedora-all]↗2015-12-10 ▶ BugzillaCVE-2015-7519 passenger: Header overwriting issue allowing user impersonation↗2015-12-10 ▶