An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an error, it would cause Passenger's process manager to kill said reported arbitrary PID.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-4386 An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an error, it would cause Passenger's process manager to kill said reported arbitrary PID.
Github GHSA Github GHSA GHSA-jjhj-8gx7-x836 Incorrect Access Control in Phusion Passenger
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T08:24:03.755Z

Reserved: 2018-06-07T00:00:00

Link: CVE-2018-12028

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-17T20:29:00.463

Modified: 2024-11-21T03:44:26.963

Link: CVE-2018-12028

cve-icon Redhat

Severity : Moderate

Publid Date: 2018-06-05T00:00:00Z

Links: CVE-2018-12028 - Bugzilla

cve-icon OpenCVE Enrichment

No data.