Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.891399
Kategorie:Debian Local Security Checks
Titel:Debian LTS: Security Advisory for ruby-passenger (DLA-1399-1)
Zusammenfassung:Two flaws were discovered in ruby-passenger for Ruby Rails and Rack;support that allowed attackers to spoof HTTP headers or exploit a race;condition which made privilege escalation under certain conditions;possible.;;CVE-2015-7519;Remote attackers could spoof headers passed to applications by using;an underscore character instead of a dash character in an HTTP;header as demonstrated by an X_User header.;;CVE-2018-12029;A vulnerability was discovered by the Pulse Security team. It was;exploitable only when running a non-standard;passenger_instance_registry_dir, via a race condition where after a;file was created, there was a window in which it could be replaced;with a symlink before it was chowned via the path and not the file;descriptor. If the symlink target was to a file which would be;executed by root such as root's crontab file, then privilege;escalation was possible. This is now mitigated by using fchown().
Beschreibung:Summary:
Two flaws were discovered in ruby-passenger for Ruby Rails and Rack
support that allowed attackers to spoof HTTP headers or exploit a race
condition which made privilege escalation under certain conditions
possible.

CVE-2015-7519
Remote attackers could spoof headers passed to applications by using
an underscore character instead of a dash character in an HTTP
header as demonstrated by an X_User header.

CVE-2018-12029
A vulnerability was discovered by the Pulse Security team. It was
exploitable only when running a non-standard
passenger_instance_registry_dir, via a race condition where after a
file was created, there was a window in which it could be replaced
with a symlink before it was chowned via the path and not the file
descriptor. If the symlink target was to a file which would be
executed by root such as root's crontab file, then privilege
escalation was possible. This is now mitigated by using fchown().

Affected Software/OS:
ruby-passenger on Debian Linux

Solution:
For Debian 8 'Jessie', these problems have been fixed in version
4.0.53-1+deb8u1.

We recommend that you upgrade your ruby-passenger packages.

CVSS Score:
4.4

CVSS Vector:
AV:L/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2015-7519
https://lists.debian.org/debian-lts-announce/2018/06/msg00007.html
http://www.openwall.com/lists/oss-security/2015/12/07/1
http://www.openwall.com/lists/oss-security/2015/12/07/2
SuSE Security Announcement: SUSE-SU-2015:2337 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00024.html
CopyrightCopyright (C) 2018 Greenbone Networks GmbH http://greenbone.net

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.