PIL and Pillow Vulnerable to Symlink Attack on Tmpfiles
High severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Oct 9, 2024
Description
Published by the National Vulnerability Database
Apr 17, 2014
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Aug 16, 2023
Last updated
Oct 9, 2024
The (1)
load_djpeg
function inJpegImagePlugin.py
, (2)Ghostscript
function inEpsImagePlugin.py
, (3)load
function inIptcImagePlugin.py
, and (4)_copy
function inImage.py
in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.References