CVE-2018-12026
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in turn can result in information disclosure and privilege escalation.
Durante la generación de una aplicación maliciosa gestionada por Passenger, SpawningKit en Phusion Passenger en versiones 5.3.x anteriores a la 5.3.2 permite que tales aplicaciones reemplacen archivos o directorios claves en el directorio spawning communication con vínculos simbólicos. Esto podría resultar en lecturas y escrituras arbitrarias, que en cambio podrían resultar en una revelación de información y un escalado de privilegios.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-06-07 CVE Reserved
- 2018-06-17 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://blog.phusion.nl/passenger-5-3-2 | 2019-03-08 | |
https://security.gentoo.org/glsa/201807-02 | 2019-03-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Phusion Search vendor "Phusion" | Passenger Search vendor "Phusion" for product "Passenger" | >= 5.3.0 < 5.3.2 Search vendor "Phusion" for product "Passenger" and version " >= 5.3.0 < 5.3.2" | - |
Affected
|