Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jjcj-fgfm-9g9r

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 7

Описание

Phusion Passenger Race Condition Allows Privilege Escalation

A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation.

Пакеты

Наименование

passenger

rubygems
Затронутые версииВерсия исправления

>= 3.0.0, < 5.3.2

5.3.2

EPSS

Процентиль: 28%
0.00099
Низкий

7 High

CVSS3

Дефекты

CWE-362

Связанные уязвимости

CVSS3: 7
ubuntu
больше 7 лет назад

A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation.

CVSS3: 7.8
redhat
больше 7 лет назад

A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation.

CVSS3: 7
nvd
больше 7 лет назад

A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation.

CVSS3: 7
debian
больше 7 лет назад

A race condition in the nginx module in Phusion Passenger 3.x through ...

suse-cvrf
больше 7 лет назад

Security update for rubygem-passenger

EPSS

Процентиль: 28%
0.00099
Низкий

7 High

CVSS3

Дефекты

CWE-362