CVE-2018-12026Link Following in Passenger

Severity
9.8CRITICALNVD
EPSS
1.1%
top 21.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 17
Latest updateMay 14

Description

During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in turn can result in information disclosure and privilege escalation.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDphusion/passenger5.3.05.3.2
RubyGemsphusion/passenger5.3.05.3.2
Ubuntuphusion/passenger< 6.0.10-3build1

🔴Vulnerability Details

4
GHSA
Phusion Passenger SpawningKit Contains Arbitrary Read/Write Vulnerability2022-05-14
OSV
Phusion Passenger SpawningKit Contains Arbitrary Read/Write Vulnerability2022-05-14
CVEList
CVE-2018-12026: During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 52018-06-17
OSV
CVE-2018-12026: During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 52018-06-17

📋Vendor Advisories

2
Red Hat
passenger: SpawningKit allows malicious applications to replace files and directories allowing for arbitrary reads and writes2018-06-05
Debian
CVE-2018-12026: passenger - During the spawning of a malicious Passenger-managed application, SpawningKit in...2018

💬Community

1
Bugzilla
CVE-2018-12026 passenger: SpawningKit allows malicious applications to replace files and directories allowing for arbitrary reads and writes2018-06-19
CVE-2018-12026 — Link Following in Phusion Passenger | cvebase