Vulnerabilities > CVE-2014-1832 - Incomplete Fix Insecure Temporary File Creation vulnerability in Ruby Phusion Passenger
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
NONE Summary
Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831. <a href="http://cwe.mitre.org/data/definitions/61.html">CWE-61: UNIX Symbolic Link (Symlink) Following</a>
Vulnerable Configurations
Nessus
NASL family | Fedora Local Security Checks |
NASL id | FEDORA_2015-1151.NASL |
description | build for f20 (#1058993) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-06-05 |
modified | 2015-02-04 |
plugin id | 81153 |
published | 2015-02-04 |
reporter | This script is Copyright (C) 2015-2020 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/81153 |
title | Fedora 20 : rubygem-passenger-4.0.53-3.fc20 (2015-1151) |
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html
- http://openwall.com/lists/oss-security/2014/01/29/6
- http://openwall.com/lists/oss-security/2014/01/30/3
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958
- https://bugzilla.redhat.com/show_bug.cgi?id=1058992
- https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0