Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.891399 |
Kategorie: | Debian Local Security Checks |
Titel: | Debian LTS: Security Advisory for ruby-passenger (DLA-1399-1) |
Zusammenfassung: | Two flaws were discovered in ruby-passenger for Ruby Rails and Rack;support that allowed attackers to spoof HTTP headers or exploit a race;condition which made privilege escalation under certain conditions;possible.;;CVE-2015-7519;Remote attackers could spoof headers passed to applications by using;an underscore character instead of a dash character in an HTTP;header as demonstrated by an X_User header.;;CVE-2018-12029;A vulnerability was discovered by the Pulse Security team. It was;exploitable only when running a non-standard;passenger_instance_registry_dir, via a race condition where after a;file was created, there was a window in which it could be replaced;with a symlink before it was chowned via the path and not the file;descriptor. If the symlink target was to a file which would be;executed by root such as root's crontab file, then privilege;escalation was possible. This is now mitigated by using fchown(). |
Beschreibung: | Summary: Two flaws were discovered in ruby-passenger for Ruby Rails and Rack support that allowed attackers to spoof HTTP headers or exploit a race condition which made privilege escalation under certain conditions possible. CVE-2015-7519 Remote attackers could spoof headers passed to applications by using an underscore character instead of a dash character in an HTTP header as demonstrated by an X_User header. CVE-2018-12029 A vulnerability was discovered by the Pulse Security team. It was exploitable only when running a non-standard passenger_instance_registry_dir, via a race condition where after a file was created, there was a window in which it could be replaced with a symlink before it was chowned via the path and not the file descriptor. If the symlink target was to a file which would be executed by root such as root's crontab file, then privilege escalation was possible. This is now mitigated by using fchown(). Affected Software/OS: ruby-passenger on Debian Linux Solution: For Debian 8 'Jessie', these problems have been fixed in version 4.0.53-1+deb8u1. We recommend that you upgrade your ruby-passenger packages. CVSS Score: 4.4 CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-7519 https://lists.debian.org/debian-lts-announce/2018/06/msg00007.html http://www.openwall.com/lists/oss-security/2015/12/07/1 http://www.openwall.com/lists/oss-security/2015/12/07/2 SuSE Security Announcement: SUSE-SU-2015:2337 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00024.html |
Copyright | Copyright (C) 2018 Greenbone Networks GmbH http://greenbone.net |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |