Phusion Passenger before 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2014-1831 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 2.1 |
---|---|
Base Metrics | AV:L/AC:L/Au:N/C:N/I:P/A:N |
Access Vector | Local |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Software Collections 1 for Red Hat Enterprise Linux | ruby193-rubygem-passenger | Will not fix |
Red Hat Enterprise Linux OpenStack Platform 4.0 | rubygem-passenger | Will not fix |
Red Hat Enterprise Linux OpenStack Platform 4.0 | ruby193-rubygem-passenger | Will not fix |