Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWoyNHAtcjZ3eC1yNzl3

High severity vulnerability that affects thin

lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header.

Permalink: https://github.com/advisories/GHSA-j24p-r6wx-r79w
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWoyNHAtcjZ3eC1yNzl3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 7 years ago
Updated: about 1 year ago


EPSS Percentage: 0.00666
EPSS Percentile: 0.79969

Identifiers: GHSA-j24p-r6wx-r79w, CVE-2009-3287
References: Repository: https://github.com/macournoyer/thin
Blast Radius: 0.0

Affected Packages

rubygems:thin
Dependent packages: 912
Dependent repositories: 75,529
Downloads: 172,702,040 total
Affected Version Ranges: < 1.2.4
Fixed in: 1.2.4
All affected versions: 0.3.0, 0.4.0, 0.4.1, 0.5.0, 0.5.2, 0.5.3, 0.5.4, 0.6.0, 0.6.1, 0.6.2, 0.6.3, 0.6.4, 0.7.0, 0.7.1, 0.8.0, 0.8.1, 0.8.2, 1.0.0, 1.2.1, 1.2.2, 1.2.3
All unaffected versions: 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.2.9, 1.2.10, 1.2.11, 1.3.0, 1.3.1, 1.4.0, 1.4.1, 1.5.0, 1.5.1, 1.6.0, 1.6.1, 1.6.2, 1.6.3, 1.6.4, 1.7.0, 1.7.1, 1.7.2, 1.8.0, 1.8.1, 1.8.2