Phusion

Passenger

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.68%
  • Veröffentlicht 24.02.2025 16:15:15
  • Zuletzt bearbeitet 28.02.2025 16:07:41

The http parser in Phusion Passenger 6.0.21 through 6.0.25 before 6.0.26 allows a denial of service during parsing of a request with an invalid HTTP method.

  • EPSS 1.27%
  • Veröffentlicht 19.11.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 01:45:53

RubyGems passenger 4.0.0 betas 1 and 2 allows remote attackers to delete arbitrary files during the startup process.

  • EPSS 0.2%
  • Veröffentlicht 21.06.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:32

An issue was discovered in switchGroup() in agent/ExecHelper/ExecHelperMain.cpp in Phusion Passenger before 5.3.2. The set of groups (gidset) is not set correctly, leaving it up to randomness (i.e., uninitialized memory) which supplementary groups ar...

  • EPSS 1.18%
  • Veröffentlicht 17.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:26

During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could ...

  • EPSS 0.29%
  • Veröffentlicht 17.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:26

An Insecure Permissions vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 causes information disclosure in the following situation: given a Passenger-spawned application process that reports that it listens on a certain Unix domain...

  • EPSS 0.18%
  • Veröffentlicht 17.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:26

An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager...

  • EPSS 0.1%
  • Veröffentlicht 17.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:27

A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file wi...

  • EPSS 0.14%
  • Veröffentlicht 14.12.2017 22:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In agent/Core/SpawningKit/Spawner.h in Phusion Passenger 5.1.10 (fixed in Passenger Open Source 5.1.11 and Passenger Enterprise 5.1.10), if Passenger is running as root, it is possible to list the contents of arbitrary files on a system by symlinking...

  • EPSS 0.06%
  • Veröffentlicht 18.04.2017 20:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user.

  • EPSS 0.07%
  • Veröffentlicht 19.02.2015 15:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.