Input validation error in Phusion Passenger - CVE-2015-7519

 

Input validation error in Phusion Passenger - CVE-2015-7519

Published: January 8, 2016 / Updated: August 9, 2020


Vulnerability identifier: #VU40538
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2015-7519
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Phusion B.V.
Affected software:
Phusion Passenger

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.


How to mitigate CVE-2015-7519

Install update from vendor's website.

Sources