Phusion Passenger Race Condition Allows Privilege Escalation
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Jul 3, 2023
Description
Published by the National Vulnerability Database
Jun 17, 2018
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jun 9, 2023
Last updated
Jul 3, 2023
A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, leads to the target of the link being chowned via the path. Targeting sensitive files such as root's crontab file allows privilege escalation.
References