CVE-2018-12026 – passenger
Package
Manager: gem
Name: passenger
Vulnerable Version: >=5.3.0 <5.3.2
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.01183 pctl0.77979
Details
Phusion Passenger SpawningKit Contains Arbitrary Read/Write Vulnerability During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in turn can result in information disclosure and privilege escalation.
Metadata
Created: 2022-05-14T01:27:14Z
Modified: 2023-07-03T21:44:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-7cv3-gvmc-8mq5/GHSA-7cv3-gvmc-8mq5.json
CWE IDs: ["CWE-59"]
Alternative ID: GHSA-7cv3-gvmc-8mq5
Finding: F076
Auto approve: 1