Vulnerability Description
In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phusion | Passenger | <= 5.0.30 |
Related Weaknesses (CWE)
References
- https://github.com/phusion/passenger/blob/stable-5.1/CHANGELOGPatchRelease Notes
- https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeaPatch
- https://github.com/phusion/passenger/blob/stable-5.1/CHANGELOGPatchRelease Notes
- https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeaPatch
FAQ
What is CVE-2016-10345?
CVE-2016-10345 is a vulnerability with a CVSS score of 7.8 (HIGH). In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user.
How severe is CVE-2016-10345?
CVE-2016-10345 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10345?
Check the references section above for vendor advisories and patch information. Affected products include: Phusion Passenger.