Количество 7
Количество 7
CVE-2018-12029
A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation.
CVE-2018-12029
A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation.
CVE-2018-12029
A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation.
CVE-2018-12029
A race condition in the nginx module in Phusion Passenger 3.x through ...
SUSE-SU-2018:2039-1
Security update for rubygem-passenger
GHSA-jjcj-fgfm-9g9r
Phusion Passenger Race Condition Allows Privilege Escalation
BDU:2019-01638
Уязвимость модуля nginx веб-сервера Phusion Passenger, связанная с одновременным использованием общего ресурса и ошибками синхронизации, позволяющая нарушителю получить доступ к конфиденциальным данным
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-12029 A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation. | CVSS3: 7 | 0% Низкий | больше 7 лет назад | |
CVE-2018-12029 A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation. | CVSS3: 7.8 | 0% Низкий | больше 7 лет назад | |
CVE-2018-12029 A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation. | CVSS3: 7 | 0% Низкий | больше 7 лет назад | |
CVE-2018-12029 A race condition in the nginx module in Phusion Passenger 3.x through ... | CVSS3: 7 | 0% Низкий | больше 7 лет назад | |
SUSE-SU-2018:2039-1 Security update for rubygem-passenger | 0% Низкий | больше 7 лет назад | ||
GHSA-jjcj-fgfm-9g9r Phusion Passenger Race Condition Allows Privilege Escalation | CVSS3: 7 | 0% Низкий | больше 3 лет назад | |
BDU:2019-01638 Уязвимость модуля nginx веб-сервера Phusion Passenger, связанная с одновременным использованием общего ресурса и ошибками синхронизации, позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 7 | 0% Низкий | больше 7 лет назад |
Уязвимостей на страницу