FKIE_CVE-2017-16355
Vulnerability from fkie_nvd - Published: 2017-12-14 22:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
In agent/Core/SpawningKit/Spawner.h in Phusion Passenger 5.1.10 (fixed in Passenger Open Source 5.1.11 and Passenger Enterprise 5.1.10), if Passenger is running as root, it is possible to list the contents of arbitrary files on a system by symlinking a file named REVISION from the application root folder to a file of choice and querying passenger-status --show=xml.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://blog.phusion.nl/2017/10/13/passenger-security-advisory-5-1-11/ | Third Party Advisory | |
| cve@mitre.org | https://github.com/phusion/passenger/commit/4043718264095cde6623c2cbe8c644541036d7bf | Patch, Third Party Advisory | |
| cve@mitre.org | https://seclists.org/bugtraq/2019/Mar/34 | Issue Tracking, Mailing List, Third Party Advisory | |
| cve@mitre.org | https://www.debian.org/security/2019/dsa-4415 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://blog.phusion.nl/2017/10/13/passenger-security-advisory-5-1-11/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/phusion/passenger/commit/4043718264095cde6623c2cbe8c644541036d7bf | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Mar/34 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2019/dsa-4415 | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phusion:passenger:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "7E734B94-2D51-47B0-9AEF-E736969D2E82",
"versionEndExcluding": "5.1.10",
"versionStartIncluding": "5.0.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phusion:passenger:*:*:*:*:open_source:*:*:*",
"matchCriteriaId": "285B15FA-D517-437D-8C69-D7C6CBAB9468",
"versionEndExcluding": "5.1.11",
"versionStartIncluding": "5.0.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In agent/Core/SpawningKit/Spawner.h in Phusion Passenger 5.1.10 (fixed in Passenger Open Source 5.1.11 and Passenger Enterprise 5.1.10), if Passenger is running as root, it is possible to list the contents of arbitrary files on a system by symlinking a file named REVISION from the application root folder to a file of choice and querying passenger-status --show=xml."
},
{
"lang": "es",
"value": "En agent/Core/SpawningKit/Spawner.h en Phusion Passenger 5.1.10 (corregido en Passenger Open Source 5.1.11 y Passenger Enterprise 5.1.10), si Passenger se est\u00e1 ejecutando como root, es posible listar el contenido de archivos arbitrarios en un sistema vinculando simb\u00f3licamente un archivo llamado REVISION de la carpeta root de la aplicaci\u00f3n a un archivo de libre elecci\u00f3n y consultando passenger-status --show=xml."
}
],
"id": "CVE-2017-16355",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.2,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 1.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-12-14T22:29:00.210",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.phusion.nl/2017/10/13/passenger-security-advisory-5-1-11/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/phusion/passenger/commit/4043718264095cde6623c2cbe8c644541036d7bf"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Mar/34"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2019/dsa-4415"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.phusion.nl/2017/10/13/passenger-security-advisory-5-1-11/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/phusion/passenger/commit/4043718264095cde6623c2cbe8c644541036d7bf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Mar/34"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2019/dsa-4415"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…