PyPi: Rply

CVE-2014-1604

Safety vulnerability ID: 35520

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jan 28, 2014 Updated at Mar 29, 2024
Scan your Python projects for vulnerabilities →

Advisory

The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.

Affected package

rply

Latest version: 0.7.8

A pure Python Lex/Yacc that works with RPython

Affected versions

Fixed versions

Vulnerability changelog

The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.


MLIST:[oss-security] 20140114 Fwd: [Python-modules-team] Bug#735263: python-rply: insecure use of /tmp: http://www.openwall.com/lists/oss-security/2014/01/17/8
MLIST:[oss-security] 20140117 Re: Fwd: [Python-modules-team] Bug#735263: python-rply: insecure use of /tmp: http://www.openwall.com/lists/oss-security/2014/01/18/4
CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735263: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735263
CONFIRM:https://github.com/alex/rply/commit/fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c: https://github.com/alex/rply/commit/fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c
OSVDB:102202: http://www.osvdb.org/102202
SECUNIA:56429: http://secunia.com/advisories/56429
XF:rply-cve20141604-insecure-permissions(90593): https://exchange.xforce.ibmcloud.com/vulnerabilities/90593

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

LOW 2.1

CVSS v2 Details

LOW 2.1
Access Vector (AV)
LOCAL
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
PARTIAL
Availability Impact (A)
NONE