Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qw8w-2xcp-xg59

Опубликовано: 10 окт. 2018
Источник: github
Github: Прошло ревью

Описание

Insecure use of temporary files in Phusion passenger

Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.

Пакеты

Наименование

passenger

rubygems
Затронутые версииВерсия исправления

= 4.0.37

4.0.38

EPSS

Процентиль: 21%
0.00067
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.

redhat
около 12 лет назад

Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.

nvd
почти 11 лет назад

Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.

debian
почти 11 лет назад

Phusion Passenger 4.0.37 allows local users to write to certain files ...

EPSS

Процентиль: 21%
0.00067
Низкий