Описание
Phusion Passenger uses a known /tmp filename
In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2016-10345
- https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441
- https://blog.phusion.nl/2017/01/10/passenger-5-1-1
- https://github.com/advisories/GHSA-cqxw-3p7v-p9gr
- https://github.com/phusion/passenger
- https://github.com/phusion/passenger/blob/stable-5.1/CHANGELOG
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2016-10345.yml
Пакеты
passenger
< 5.1.0
5.1.0
Связанные уязвимости
In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user.
In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user.
In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user.
In Phusion Passenger before 5.1.0, a known /tmp filename was used duri ...