CVE-2018-12027:
Insecure Permissions in Phusion Passenger
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.52016%
CWE
Published
5/13/2022
Updated
6/28/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
passenger | rubygems | >= 5.3.0, < 5.3.2 | 5.3.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure directory permission handling in SpawningKit's process
spawning logic. The Phusion blog explicitly mentions SpawningKit improvements including 'symlink-resistant I/O operations' and validation
that sockets must be created within secure subdirectories. The CVE description directly implicates directory writability checks during socket path creation. While exact function
names aren't provided in public advisories, the SpawningKit component's responsibility for instance directory/socket management and the described fixes (e.g., path validation
, fchmod
usage) strongly indicate vulnerabilities in these core directory/socket setup functions
.