lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header.
github.com/macournoyer/thin
github.com/macournoyer/thin/blob/master/CHANGELOG
github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a
www.openwall.com/lists/oss-security/2009/09/12/1
github.com/advisories/GHSA-j24p-r6wx-r79w
github.com/rubysec/ruby-advisory-db/blob/master/gems/thin/CVE-2009-3287.yml
nvd.nist.gov/vuln/detail/CVE-2009-3287