SB2016010802 - Input validation error in Phusion Passenger



SB2016010802 - Input validation error in Phusion Passenger

Published: January 8, 2016 Updated: August 9, 2020

Security Bulletin ID SB2016010802
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2015-7519)

The vulnerability allows a remote non-authenticated attacker to manipulate data.

agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.


Remediation

Install update from vendor's website.