oss-sec mailing list archives
Re: phusion passenger CVE-2017-1000384
From: John Lightsey <jd () cpanel net>
Date: Tue, 21 Nov 2017 17:15:56 -0600
On 11/21/17 4:11 PM, Tomas Hoger wrote:
On Fri, 17 Nov 2017 14:58:43 -0600 John Lightsey wrote:https://bugs.gentoo.org/634452The commit for the arbitrary file read vulnerability mentioned in the Gentoo bug report is actually this one: https://github.com/phusion/passenger/commit/4043718264095cde6623c2cbe8c644541036d7bfIs passenger-status the only way to obtain the content of the target file? If so, this problem is mitigated in versions prior to 5.0.10 where root privileges were required to get the status information.
Yes, that is accurate as far as I'm aware.
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature
Current thread:
- phusion passenger CVE-2017-1000384 Kurt Seifried (Nov 17)
- Re: phusion passenger CVE-2017-1000384 John Lightsey (Nov 17)
- Re: phusion passenger CVE-2017-1000384 Jakub Wilk (Nov 17)
- Re: phusion passenger CVE-2017-1000384 John Lightsey (Nov 17)
- Re: phusion passenger CVE-2017-1000384 Dave Horsfall (Nov 17)
- Re: phusion passenger CVE-2017-1000384 Tomas Hoger (Nov 21)
- Re: phusion passenger CVE-2017-1000384 John Lightsey (Nov 21)
- Re: phusion passenger CVE-2017-1000384 Jakub Wilk (Nov 17)
- Re: phusion passenger CVE-2017-1000384 John Lightsey (Nov 17)