Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-kxtc-uenz-eycy
Vulnerability ID VCID-kxtc-uenz-eycy
Aliases CVE-2013-2119
GHSA-9qj7-jvg4-qr2x
OSV-93752
Summary Incorrect temporary file usage The passenger ruby gem, when used in standalone mode, does not use temporary files securely. If a local attacker were able to create a temporary directory that passenger uses and supply a custom nginx configuration file they could start a nginx instance with their own configuration file.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
generic_textual MODERATE http://blog.phusion.nl/2013/05/29/phusion-passenger-3-0-21-released
generic_textual MODERATE http://blog.phusion.nl/2013/05/29/phusion-passenger-4-0-5-released
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2013-1136.html
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2013:1136
generic_textual MODERATE https://access.redhat.com/security/cve/CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2013-2119
generic_textual MODERATE https://bugzilla.redhat.com/show_bug.cgi?id=892813
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-9qj7-jvg4-qr2x
generic_textual MODERATE https://github.com/advisories/GHSA-9qj7-jvg4-qr2x
generic_textual MODERATE https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2013-2119.yml
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2013-2119
No exploits are available.
Exploit Prediction Scoring System (EPSS)
Percentile 0.17499
EPSS Score 0.00056
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:46:51.265278+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/passenger/CVE-2013-2119.yml 38.0.0