Lucene search

K
rubygemsRubySecRUBY:PASSENGER-2018-12026
HistoryJun 11, 2018 - 9:00 p.m.

SpawningKit exploits

2018-06-1121:00:00
RubySec
blog.phusion.nl
13

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

During the spawning of a malicious Passenger-managed application, SpawningKit
in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace
key files or directories in the spawning communication directory with
symlinks. This then could result in arbitrary reads and writes, which in turn
can result in information disclosure and privilege escalation.

Affected configurations

Vulners
Node
rubypassengerRange5.3.2
VendorProductVersionCPE
rubypassenger*cpe:2.3:a:ruby:passenger:*:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H