The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-commons before 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a symlink attack on /tmp/toto.fdf.
References
Configurations
History
21 Nov 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://comments.gmane.org/gmane.comp.security.oss.general/11986 - | |
References | () http://lists.opensuse.org/opensuse-updates/2014-02/msg00085.html - | |
References | () http://secunia.com/advisories/57209 - | |
References | () http://www.logilab.org/ticket/207561 - | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737051 - |
Information
Published : 2014-03-11 19:37
Updated : 2025-04-12 10:46
NVD link : CVE-2014-1838
Mitre link : CVE-2014-1838
CVE.ORG link : CVE-2014-1838
JSON object : View
Products Affected
opensuse
- opensuse
logilab
- logilab-common
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')