CVE-2009-3287 (NVD)

2009-09-22

lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header.

Products Thin
Type Improper Input Validation (CWE-20)
First patch http://github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a
Relevant file/s • ./CHANGELOG (modified, +1)
• ./lib/thin/connection.rb (modified, +1, -1)
• ./lib/thin/request.rb (modified, -5)
• ./lib/thin/version.rb (modified, +2, -2)
• ./spec/connection_spec.rb (modified, +3, -2)
Links http://github.com/macournoyer/thin/blob/master/CHANGELOG
http://www.openwall.com/lists/oss-security/2009/09/12/1

thin - Tree: 7bd027914c

(? files)

Filter Settings
Files
Navigation
Patch data:

(on by default)


Patched area: