agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-394-1 passenger security update
Debian DLA Debian DLA DLA-1399-1 ruby-passenger security update
EUVD EUVD EUVD-2018-0595 agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.
Github GHSA Github GHSA GHSA-fxwv-953p-7qpf Phusion Passenger allows remote attackers to spoof headers
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T07:51:28.493Z

Reserved: 2015-09-29T00:00:00

Link: CVE-2015-7519

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-01-08T19:59:05.600

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-7519

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-12-07T00:00:00Z

Links: CVE-2015-7519 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses