An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an error, it would cause Passenger's process manager to kill said reported arbitrary PID.
References
Link | Resource |
---|---|
https://blog.phusion.nl/passenger-5-3-2 | Mitigation Vendor Advisory |
https://security.gentoo.org/glsa/201807-02 | Third Party Advisory |
https://blog.phusion.nl/passenger-5-3-2 | Mitigation Vendor Advisory |
https://security.gentoo.org/glsa/201807-02 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.phusion.nl/passenger-5-3-2 - Mitigation, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201807-02 - Third Party Advisory |
Information
Published : 2018-06-17 20:29
Updated : 2024-11-21 03:44
NVD link : CVE-2018-12028
Mitre link : CVE-2018-12028
CVE.ORG link : CVE-2018-12028
JSON object : View
Products Affected
phusion
- passenger
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource