logo

CVE-2018-12026 passenger

Package

Manager: gem
Name: passenger
Vulnerable Version: >=5.3.0 <5.3.2

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.01183 pctl0.77979

Details

Phusion Passenger SpawningKit Contains Arbitrary Read/Write Vulnerability During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in turn can result in information disclosure and privilege escalation.

Metadata

Created: 2022-05-14T01:27:14Z
Modified: 2023-07-03T21:44:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-7cv3-gvmc-8mq5/GHSA-7cv3-gvmc-8mq5.json
CWE IDs: ["CWE-59"]
Alternative ID: GHSA-7cv3-gvmc-8mq5
Finding: F076
Auto approve: 1