Vulnerabilities > Phusion > Passenger
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-11-19 | CVE-2012-6135 | Improper Input Validation vulnerability in multiple products RubyGems passenger 4.0.0 betas 1 and 2 allows remote attackers to delete arbitrary files during the startup process. | 6.4 |
2018-06-21 | CVE-2018-12615 | Incorrect Permission Assignment for Critical Resource vulnerability in Phusion Passenger An issue was discovered in switchGroup() in agent/ExecHelper/ExecHelperMain.cpp in Phusion Passenger before 5.3.2. | 5.0 |
2018-06-17 | CVE-2018-12029 | Race Condition vulnerability in multiple products A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. | 4.4 |
2018-06-17 | CVE-2018-12028 | Incorrect Permission Assignment for Critical Resource vulnerability in Phusion Passenger 5.3.0/5.3.1 An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. | 6.8 |
2018-06-17 | CVE-2018-12027 | Information Exposure vulnerability in Phusion Passenger 5.3.0/5.3.1 An Insecure Permissions vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 causes information disclosure in the following situation: given a Passenger-spawned application process that reports that it listens on a certain Unix domain socket, if any of the parent directories of said socket are writable by a normal user that is not the application's user, then that non-application user can swap that directory with something else, resulting in traffic being redirected to a non-application user's process through an alternative Unix domain socket. | 6.5 |
2018-06-17 | CVE-2018-12026 | Link Following vulnerability in Phusion Passenger 5.3.0/5.3.1 During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. | 7.5 |
2017-12-14 | CVE-2017-16355 | Information Exposure vulnerability in multiple products In agent/Core/SpawningKit/Spawner.h in Phusion Passenger 5.1.10 (fixed in Passenger Open Source 5.1.11 and Passenger Enterprise 5.1.10), if Passenger is running as root, it is possible to list the contents of arbitrary files on a system by symlinking a file named REVISION from the application root folder to a file of choice and querying passenger-status --show=xml. | 1.2 |
2017-04-18 | CVE-2016-10345 | Permissions, Privileges, and Access Controls vulnerability in Phusion Passenger In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user. | 4.6 |
2015-02-19 | CVE-2014-1832 | Incomplete Fix Insecure Temporary File Creation vulnerability in Ruby Phusion Passenger Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. | 2.1 |
2015-02-19 | CVE-2014-1831 | Unspecified vulnerability in Phusion Passenger Phusion Passenger before 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. | 2.1 |