4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
3.7 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
0.007 Low
EPSS
Percentile
80.8%
agent/Core/Controller/SendRequest.cpp
in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _
(underscore) character instead of a -
(dash) character in an HTTP header, as demonstrated by an X_User
header.
lists.opensuse.org/opensuse-security-announce/2015-12/msg00024.html
www.openwall.com/lists/oss-security/2015/12/07/1
www.openwall.com/lists/oss-security/2015/12/07/2
blog.phusion.nl/2015/12/07/cve-2015-7519/
bugzilla.suse.com/show_bug.cgi?id=956281
github.com/advisories/GHSA-fxwv-953p-7qpf
github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e
github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2015-7519.yml
lists.debian.org/debian-lts-announce/2018/06/msg00007.html
nvd.nist.gov/vuln/detail/CVE-2015-7519
web.archive.org/web/20220327073056/https://www.puppet.com/security/cve/passenger-dec-2015-security-fixes
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
3.7 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
0.007 Low
EPSS
Percentile
80.8%