First published: Thu Feb 19 2015(Updated: )
Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phusion Passenger | <=4.0.36 | |
rubygems/passenger | =4.0.37 | 4.0.38 |
debian/passenger | 5.0.30-1.2+deb11u1 6.0.17+ds-1 6.0.20+ds-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1832 is a moderate severity vulnerability that allows local users to modify certain files through a symlink attack.
To fix CVE-2014-1832, upgrade Phusion Passenger to version 4.0.38 or later.
Phusion Passenger versions up to and including 4.0.36 are affected by CVE-2014-1832.
CVE-2014-1832 allows local users to write to files like control_process.pid or generation-* files via a symlink attack.
Yes, CVE-2014-1832 is linked to an incomplete fix for CVE-2014-1831.