Описание
RPLY Predictable Tmpfile Names Allows Cache Spoofing
The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-1604
- https://github.com/alex/rply/commit/fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90593
- https://github.com/pypa/advisory-database/tree/main/vulns/rply/PYSEC-2014-17.yaml
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735263
- http://www.openwall.com/lists/oss-security/2014/01/17/8
- http://www.openwall.com/lists/oss-security/2014/01/18/4
Пакеты
Наименование
rply
pip
Затронутые версииВерсия исправления
< 0.7.1
0.7.1
Связанные уязвимости
ubuntu
около 12 лет назад
The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.
nvd
около 12 лет назад
The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.
debian
около 12 лет назад
The parser cache functionality in parsergenerator.py in RPLY (aka pyth ...