First published: Sun Jun 17 2018(Updated: )
An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an error, it would cause Passenger's process manager to kill said reported arbitrary PID.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phusion Passenger | >=5.3.0<5.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-12028 is high.
Phusion Passenger versions between 5.3.0 and 5.3.2 are affected by CVE-2018-12028.
CVE-2018-12028 allows a malicious application to report an arbitrary different Process ID (PID) to Passenger's process manager, potentially leading to unauthorized access or privilege escalation.
Yes, the vulnerability has been fixed in Phusion Passenger version 5.3.2.
More information about CVE-2018-12028 can be found at the following links: [https://blog.phusion.nl/passenger-5-3-2](https://blog.phusion.nl/passenger-5-3-2) and [https://security.gentoo.org/glsa/201807-02](https://security.gentoo.org/glsa/201807-02).