Lucene search

K
freebsdFreeBSD84FDD1BB-9D37-11E5-8F5C-002590263BF5
HistoryDec 07, 2015 - 12:00 a.m.

passenger -- client controlled header overwriting

2015-12-0700:00:00
vuxml.freebsd.org
11

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

0.007 Low

EPSS

Percentile

80.8%

Daniel Knoppel reports:

It was discovered by the SUSE security team that it was possible,
in some cases, for clients to overwrite headers set by the server,
resulting in a medium level security issue. CVE-2015-7519 has been
assigned to this issue.
Affected use-cases:
Header overwriting may occur if all of the following conditions are met:

Apache integration mode, or standalone+builtin engine without
a filtering proxy
Ruby or Python applications only (Passenger 5); or any
application (Passenger 4)
The app depends on a request header containing a dash (-)
The header is supposed to be trusted (set by the server)
The client correctly guesses the header name

This vulnerability has been fixed by filtering out client headers
that do not consist of alphanumeric/dash characters (Nginx already
did this, so Passenger+Nginx was not affected). If your application
depends on headers that don’t conform to this, you can add a
workaround in Apache specifically for those to convert them to a
dash-based format.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchrubygem-passenger= 5.0.0UNKNOWN
FreeBSDanynoarchrubygem-passenger< 5.0.22UNKNOWN

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

0.007 Low

EPSS

Percentile

80.8%