CVE-2017-16355Sensitive Information Exposure in Passenger

Severity
4.7MEDIUMNVD
EPSS
0.1%
top 66.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 14
Latest updateMay 13

Description

In agent/Core/SpawningKit/Spawner.h in Phusion Passenger 5.1.10 (fixed in Passenger Open Source 5.1.11 and Passenger Enterprise 5.1.10), if Passenger is running as root, it is possible to list the contents of arbitrary files on a system by symlinking a file named REVISION from the application root folder to a file of choice and querying passenger-status --show=xml.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.0 | Impact: 3.6

Affected Packages4 packages

NVDphusion/passenger5.0.105.1.10+1
RubyGemsphusion/passenger< 5.1.11
Debianphusion/passenger< 5.0.30-1.1+3
Ubuntuphusion/passenger< 5.0.27-2ubuntu0.1~esm1

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

5
OSV
Phusion Passenger information disclosure2022-05-13
GHSA
Phusion Passenger information disclosure2022-05-13
OSV
passenger vulnerabilities2022-02-01
OSV
CVE-2017-16355: In agent/Core/SpawningKit/Spawner2017-12-14
CVEList
CVE-2017-16355: In agent/Core/SpawningKit/Spawner2017-12-14

📋Vendor Advisories

3
Ubuntu
Phusion Passenger vulnerabilities2022-02-01
Red Hat
passenger: arbitrary file read via REVISION symlink2017-10-16
Debian
CVE-2017-16355: passenger - In agent/Core/SpawningKit/Spawner.h in Phusion Passenger 5.1.10 (fixed in Passen...2017

💬Community

1
Bugzilla
CVE-2017-16355 passenger: arbitrary file read via REVISION symlink2017-11-15
CVE-2017-16355 — Sensitive Information Exposure | cvebase