Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-1933

Опубликовано: 29 янв. 2014
Источник: redhat
CVSS2: 2.1
EPSS Низкий

Описание

The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5python-imagingWill not fix
Red Hat Enterprise Linux 6python-imagingWill not fix
Red Hat Enterprise Linux 7python-pillowWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-214
https://bugzilla.redhat.com/show_bug.cgi?id=1063660python-imaging: temporary file name exposure in process list

EPSS

Процентиль: 30%
0.00111
Низкий

2.1 Low

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.

nvd
почти 12 лет назад

The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.

debian
почти 12 лет назад

The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python ...

CVSS3: 4
github
больше 5 лет назад

Pillow Temporary file name leakage

EPSS

Процентиль: 30%
0.00111
Низкий

2.1 Low

CVSS2