Note:
This project will be discontinued after December 13, 2021. [more]
2009-09-22
lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header.
Products | Thin |
Type | Improper Input Validation (CWE-20) |
First patch |
http://github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a |
Relevant file/s |
• ./CHANGELOG (modified, +1)
• ./lib/thin/connection.rb (modified, +1, -1) • ./lib/thin/request.rb (modified, -5) • ./lib/thin/version.rb (modified, +2, -2) • ./spec/connection_spec.rb (modified, +3, -2) |
Links |
• http://github.com/macournoyer/thin/blob/master/CHANGELOG
• http://www.openwall.com/lists/oss-security/2009/09/12/1 |
Navigation
Patch data:
Patched area:
(on by default)
Patched area: