CVE-2009-3287
Published Sep 22, 2009
Last updated 15 years ago
Overview
- Description
- lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:macournoyer:thin:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDB8B96B-7544-4ED1-97AF-BED85A6E02A2", "versionEndIncluding": "1.2.2" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3722C121-CA76-4BD6-9B17-059C1051BD3D" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8DFE094-2523-47F6-9310-BE48DF205825" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCA76B41-8699-4AB9-8569-98D792359C53" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9BDC31A-0F16-4817-802B-C603050D7E83" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB082342-11F8-479C-B884-0D3E6074A600" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5367748-33ED-4AFC-951A-B3B10B9CA94F" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "627C15A0-669D-4E56-9C31-8B8FBF60F3C0" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72D1B13B-96DE-4151-BEEC-2D438CBD4B7E" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F90B1079-9276-486F-86B8-B7E2FEF49B84" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A8E67F2-6A68-4DF2-BBFC-CD5FB8401CCF" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D151CA6-9C63-489D-B4AC-19F357E75C73" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A47C57AC-1892-40FE-9F03-DAFBAF509976" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EB06946-318C-4E86-8F73-43E16A9EFEA3" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F03A874-0753-49F6-A9BD-3798929B3C1C" }, { "criteria": "cpe:2.3:a:macournoyer:thin:0.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57048132-7659-444A-B78A-12B199E935B7" }, { "criteria": "cpe:2.3:a:macournoyer:thin:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F00DA27E-EB76-4773-A7DE-14246C24FFFA" }, { "criteria": "cpe:2.3:a:macournoyer:thin:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A8B33E0-77F2-405F-8755-02C30509C652" }, { "criteria": "cpe:2.3:a:macournoyer:thin:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49E5A94C-3262-4AA3-90F0-5E7B45E213A5" }, { "criteria": "cpe:2.3:a:macournoyer:thin:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63C61B64-0B37-4F7B-8C47-BCA425E09A97" }, { "criteria": "cpe:2.3:a:macournoyer:thin:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F2E2ACB-9ED2-4712-8A25-DE288DBF27DE" } ], "operator": "OR" } ] } ]