Vulnerabilities > CVE-2014-1831 - Unspecified vulnerability in Phusion Passenger
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN phusion
nessus
Summary
Phusion Passenger before 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file.
Vulnerable Configurations
Nessus
NASL family | Fedora Local Security Checks |
NASL id | FEDORA_2015-1151.NASL |
description | build for f20 (#1058993) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-06-05 |
modified | 2015-02-04 |
plugin id | 81153 |
published | 2015-02-04 |
reporter | This script is Copyright (C) 2015-2020 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/81153 |
title | Fedora 20 : rubygem-passenger-4.0.53-3.fc20 (2015-1151) |
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html
- http://openwall.com/lists/oss-security/2014/01/28/8
- http://openwall.com/lists/oss-security/2014/01/28/8
- http://openwall.com/lists/oss-security/2014/01/30/3
- http://openwall.com/lists/oss-security/2014/01/30/3
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958
- https://bugzilla.redhat.com/show_bug.cgi?id=1058992
- https://bugzilla.redhat.com/show_bug.cgi?id=1058992
- https://github.com/phusion/passenger/commit/34b1087870c2
- https://github.com/phusion/passenger/commit/34b1087870c2