as others might be interested in the answer as well, I also send it to
On irc you wrote:
15:05 < Nirkus> have some old redmine running on squeeze-lts (yeah..) and
since the update yesterday the following redmine code bails out with
"private method `split' called for nil:NilClass" at the following line:
15:06 < Nirkus> @env['QUERY_STRING'].present? ? @env['QUERY_STRING'] :
(@env['REQUEST_URI'].split('?', 2) || '')
15:11 < Nirkus> ah, the code is actually from: libactionpack-ruby1.8:
15:51 < Nirkus> downgrading to libapache2-mod-passenger=2.2.11debian-2
fixes the above issue...
In CVE-2015-7519 it was detected, that it is possible to obtain
unauthorized access if you send http variables with "_" instead of "-".
More information can be found here. As a solution it was proposed to
simply filter out all variables containing an "_". This was already done
in mod_cgi of apache and now I applied a similar patch to
libapache2-mod-passenger as well.
Unfortunately there seems to be software that relies on underscores in
variable names. So if you need such variables you might want to use the
workaround for apache, described in.