#VU18066 UNIX symbolic link following in Phusion Passenger - CVE-2017-16355
Published: March 25, 2019
Phusion Passenger
Phusion B.V.
Description
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a symlink following issue within the agent/Core/SpawningKit/Spawner.h file. A local user can create a specially crafted symbolic link from the REVISION file to an arbitrary file on the system and view contest of arbitrary file through "passenger-status --show=xml" command.