Lucene search

K
githubGitHub Advisory DatabaseGHSA-4R2W-W73W-36JM
HistoryMay 14, 2022 - 2:09 a.m.

eyeD3 is vulnerable to arbitrary file modification via symlink attack

2022-05-1402:09:24
CWE-59
GitHub Advisory Database
github.com
2

3.3 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:P/A:P

0.0004 Low

EPSS

Percentile

5.1%

tag.py in eyeD3 (aka python-eyed3) 0.7.5 and earlier for Python allows local users to modify arbitrary files via a symlink attack on a temporary file.

Affected configurations

Vulners
Node
travis_shirkeyed3Range<0.7.5
CPENameOperatorVersion
eyed3lt0.7.5

3.3 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:P/A:P

0.0004 Low

EPSS

Percentile

5.1%