Phusion Passenger up to 4.0.59/5.0.21 SendRequest.cpp Header input validation
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 3.6 | $0-$5k | 0.00 |
Summary
A vulnerability classified as critical was found in Phusion Passenger up to 4.0.59/5.0.21. Affected by this issue is some unknown functionality of the file agent/Core/Controller/SendRequest.cpp. The manipulation results in input validation (Header). This vulnerability is identified as CVE-2015-7519. The attack can be executed remotely. There is not any exploit available. Upgrading the affected component is advised.
Details
A vulnerability classified as problematic has been found in Phusion Passenger up to 4.0.59/5.0.21. Affected is an unknown function of the file agent/Core/Controller/SendRequest.cpp. The manipulation with an unknown input leads to a input validation vulnerability (Header). CWE is classifying the issue as CWE-20. The product receives input or data, but it does
not validate or incorrectly validates that the input has the
properties that are required to process the data safely and
correctly. This is going to have an impact on confidentiality, and integrity. CVE summarizes:
agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.
The weakness was released 01/08/2016 (Website). The advisory is shared for download at github.com. This vulnerability is traded as CVE-2015-7519 since 09/29/2015. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. There are known technical details, but no exploit is available.
The vulnerability scanner Nessus provides a plugin with the ID 87226 (FreeBSD : passenger -- client controlled header overwriting (84fdd1bb-9d37-11e5-8f5c-002590263bf5)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family FreeBSD Local Security Checks and running in the context l.
Upgrading to version 4.0.60 or 5.0.22 eliminates this vulnerability. A possible mitigation has been published even before and not after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at Tenable (87226) and Vulnerability Center (SBV-57354†). VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Vendor
Name
Version
- 4.0.0
- 4.0.1
- 4.0.2
- 4.0.3
- 4.0.4
- 4.0.5
- 4.0.6
- 4.0.7
- 4.0.8
- 4.0.9
- 4.0.10
- 4.0.11
- 4.0.12
- 4.0.13
- 4.0.14
- 4.0.15
- 4.0.16
- 4.0.17
- 4.0.18
- 4.0.19
- 4.0.20
- 4.0.21
- 4.0.22
- 4.0.23
- 4.0.24
- 4.0.25
- 4.0.26
- 4.0.27
- 4.0.28
- 4.0.29
- 4.0.30
- 4.0.31
- 4.0.32
- 4.0.33
- 4.0.34
- 4.0.35
- 4.0.36
- 4.0.37
- 4.0.38
- 4.0.39
- 4.0.40
- 4.0.41
- 4.0.42
- 4.0.43
- 4.0.44
- 4.0.45
- 4.0.46
- 4.0.47
- 4.0.48
- 4.0.49
- 4.0.50
- 4.0.51
- 4.0.52
- 4.0.53
- 4.0.54
- 4.0.55
- 4.0.56
- 4.0.57
- 4.0.58
- 4.0.59
- 5.0.0
- 5.0.1
- 5.0.2
- 5.0.3
- 5.0.4
- 5.0.5
- 5.0.6
- 5.0.7
- 5.0.8
- 5.0.9
- 5.0.10
- 5.0.11
- 5.0.12
- 5.0.13
- 5.0.14
- 5.0.15
- 5.0.16
- 5.0.17
- 5.0.18
- 5.0.19
- 5.0.20
- 5.0.21
License
Website
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 3.7VulDB Meta Temp Score: 3.7
VulDB Base Score: 3.7
VulDB Temp Score: 3.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 3.7
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Name: HeaderClass: Input validation / Header
CWE: CWE-20
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 87226
Nessus Name: FreeBSD : passenger -- client controlled header overwriting (84fdd1bb-9d37-11e5-8f5c-002590263bf5)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Passenger 4.0.60/5.0.22
Patch: github.com
Timeline
09/29/2015 🔍12/07/2015 🔍
12/08/2015 🔍
12/08/2015 🔍
01/08/2016 🔍
01/08/2016 🔍
01/10/2016 🔍
03/16/2016 🔍
07/02/2022 🔍
Sources
Product: github.comAdvisory: ddb8ecc4ebf260e4967f57f271d4f5761abeac3e
Status: Not defined
Confirmation: 🔍
CVE: CVE-2015-7519 (🔍)
GCVE (CVE): GCVE-0-2015-7519
GCVE (VulDB): GCVE-100-80136
Vulnerability Center: 57354 - Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22 Remote Spoofing Vulnerability, Medium
Entry
Created: 01/10/2016 20:13Updated: 07/02/2022 16:29
Changes: 01/10/2016 20:13 (65), 02/01/2019 14:36 (11), 07/02/2022 16:21 (4), 07/02/2022 16:29 (1)
Complete: 🔍
Cache ID: 216:242:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.