Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS13aGZ4LTg3N2MtNXAyOM4AASot
Insecure Permissions in Phusion Passenger
An Insecure Permissions vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 causes information disclosure in the following situation: given a Passenger-spawned application process that reports that it listens on a certain Unix domain socket, if any of the parent directories of said socket are writable by a normal user that is not the application's user, then that non-application user can swap that directory with something else, resulting in traffic being redirected to a non-application user's process through an alternative Unix domain socket.
Permalink: https://github.com/advisories/GHSA-whfx-877c-5p28JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13aGZ4LTg3N2MtNXAyOM4AASot
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: 3 months ago
CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-whfx-877c-5p28, CVE-2018-12027
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-12027
- https://blog.phusion.nl/passenger-5-3-2
- https://security.gentoo.org/glsa/201807-02
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2018-12027.yml
- https://github.com/advisories/GHSA-whfx-877c-5p28
Affected Packages
rubygems:passenger
Versions: >= 5.3.0, < 5.3.2Fixed in: 5.3.2