PIL and Pillow Vulnerable to Symlink Attack on Tmpfiles
High severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Oct 9, 2024
Description
Published by the National Vulnerability Database
Apr 17, 2014
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Aug 16, 2023
Last updated
Oct 9, 2024
The (1)
load_djpegfunction inJpegImagePlugin.py, (2)Ghostscriptfunction inEpsImagePlugin.py, (3)loadfunction inIptcImagePlugin.py, and (4)_copyfunction inImage.pyin Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.References