Safety vulnerability ID: 35520
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.
Latest version: 0.7.8
A pure Python Lex/Yacc that works with RPython
The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.
MLIST:[oss-security] 20140114 Fwd: [Python-modules-team] Bug#735263: python-rply: insecure use of /tmp: http://www.openwall.com/lists/oss-security/2014/01/17/8
MLIST:[oss-security] 20140117 Re: Fwd: [Python-modules-team] Bug#735263: python-rply: insecure use of /tmp: http://www.openwall.com/lists/oss-security/2014/01/18/4
CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735263: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735263
CONFIRM:https://github.com/alex/rply/commit/fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c: https://github.com/alex/rply/commit/fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c
OSVDB:102202: http://www.osvdb.org/102202
SECUNIA:56429: http://secunia.com/advisories/56429
XF:rply-cve20141604-insecure-permissions(90593): https://exchange.xforce.ibmcloud.com/vulnerabilities/90593
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application