CVE-2018-12028
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an error, it would cause Passenger's process manager to kill said reported arbitrary PID.
Una vulnerabilidad de control de acceso incorrecto en SpawningKit en Phusion Passenger en versiones 5.3.x anteriores a la 5.3.2 permite que una aplicación maliciosa gestionada por Passenger, al generar un proceso hijo, informe de un PID arbitrario diferente al gestor de procesos de Passenger. Si la aplicación maliciosa genera un error, provocaría que el gestor de procesos de Passenger mate dicho PID arbitrario reportado.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-06-07 CVE Reserved
- 2018-06-17 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://blog.phusion.nl/passenger-5-3-2 | 2019-10-03 | |
https://security.gentoo.org/glsa/201807-02 | 2019-10-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Phusion Search vendor "Phusion" | Passenger Search vendor "Phusion" for product "Passenger" | >= 5.3.0 < 5.3.2 Search vendor "Phusion" for product "Passenger" and version " >= 5.3.0 < 5.3.2" | - |
Affected
|