During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in turn can result in information disclosure and privilege escalation.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-2976 During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in turn can result in information disclosure and privilege escalation.
Github GHSA Github GHSA GHSA-7cv3-gvmc-8mq5 Phusion Passenger SpawningKit Contains Arbitrary Read/Write Vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T08:24:03.778Z

Reserved: 2018-06-07T00:00:00

Link: CVE-2018-12026

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-17T20:29:00.353

Modified: 2024-11-21T03:44:26.653

Link: CVE-2018-12026

cve-icon Redhat

Severity : Important

Publid Date: 2018-06-05T00:00:00Z

Links: CVE-2018-12026 - Bugzilla

cve-icon OpenCVE Enrichment

No data.