Miggo Logo

CVE-2018-12027:
Insecure Permissions in Phusion Passenger

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.52016%
Published
5/13/2022
Updated
6/28/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
passengerrubygems>= 5.3.0, < 5.3.25.3.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure directory permission handling in SpawningKit's process spawning logic. The Phusion blog explicitly mentions SpawningKit improvements including 'symlink-resistant I/O operations' and validation that sockets must be created within secure subdirectories. The CVE description directly implicates directory writability checks during socket path creation. While exact function names aren't provided in public advisories, the SpawningKit component's responsibility for instance directory/socket management and the described fixes (e.g., path validation, fchmod usage) strongly indicate vulnerabilities in these core directory/socket setup functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n Ins**ur* P*rmissions vuln*r**ility in Sp*wnin*Kit in P*usion P*ss*n**r *.*.x ***or* *.*.* **us*s in*orm*tion *is*losur* in t** *ollowin* situ*tion: *iv*n * P*ss*n**r-sp*wn** *ppli**tion pro**ss t**t r*ports t**t it list*ns on * **rt*in Unix *om*in

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* *ir**tory p*rmission **n*lin* in Sp*wnin*Kit's `pro**ss` sp*wnin* lo*i*. T** P*usion *lo* *xpli*itly m*ntions Sp*wnin*Kit improv*m*nts in*lu*in* 'symlink-r*sist*nt I/O op*r*tions' *n* `v*li**tion` t**t so*k*ts mu