CVE-2015-7519Improper Input Validation in Passenger

Severity
3.7LOWNVD
EPSS
0.4%
top 41.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 8
Latest updateOct 10

Description

agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 2.2 | Impact: 1.4

Affected Packages3 packages

RubyGemsphusion/passenger5.0.05.0.22+1
Debianphusion/passenger< 5.0.22-1+3

🔴Vulnerability Details

4
OSV
Phusion Passenger allows remote attackers to spoof headers2018-10-10
GHSA
Phusion Passenger allows remote attackers to spoof headers2018-10-10
OSV
CVE-2015-7519: agent/Core/Controller/SendRequest2016-01-08
CVEList
CVE-2015-7519: agent/Core/Controller/SendRequest2016-01-08

📋Vendor Advisories

2
Red Hat
passenger: Header overwriting issue allowing user impersonation2015-12-07
Debian
CVE-2015-7519: passenger - agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0...2015

💬Community

2
Bugzilla
CVE-2015-7519 passenger: Header overwriting issue allowing user impersonation [fedora-all]2015-12-10
Bugzilla
CVE-2015-7519 passenger: Header overwriting issue allowing user impersonation2015-12-10
CVE-2015-7519 — Improper Input Validation in Passenger | cvebase