First published: Thu Dec 14 2017(Updated: )
In agent/Core/SpawningKit/Spawner.h in Phusion Passenger 5.1.10 (fixed in Passenger Open Source 5.1.11 and Passenger Enterprise 5.1.10), if Passenger is running as root, it is possible to list the contents of arbitrary files on a system by symlinking a file named REVISION from the application root folder to a file of choice and querying passenger-status --show=xml.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/passenger | 5.0.30-1.1 5.0.30-1.2+deb11u1 6.0.17+ds-1 | |
Phusion Passenger | >=5.0.10<5.1.10 | |
Phusion Passenger | >=5.0.10<5.1.11 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2017-16355.
Phusion Passenger 5.1.10, Passenger Open Source 5.1.11, and Passenger Enterprise 5.1.10 are affected by this vulnerability.
By symlinking a file named REVISION from the application root, it is possible to list the contents of arbitrary files on a system.
This vulnerability has a severity rating of medium with a value of 4.7.
To fix this vulnerability, upgrade to Passenger Open Source 5.1.11 or Passenger Enterprise 5.1.10.