Lucene search

K
githubGitHub Advisory DatabaseGHSA-5PJJ-7M4P-WFH2
HistoryMay 17, 2022 - 2:04 a.m.

ocrodjvu is vulnerable to Arbitrary File Modification via symlink attack

2022-05-1702:04:28
CWE-59
GitHub Advisory Database
github.com
7
ocrodjvu
arbitrary file modification
debian gnu/linux
symlink attack
cuneiform
ocr engine
software

CVSS2

6.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

AI Score

6.8

Confidence

High

EPSS

0

Percentile

5.1%

ocrodjvu 0.4.6-1 on Debian GNU/Linux allows local users to modify arbitrary files via a symlink attack on temporary files that are generated when Cuneiform is invoked as the OCR engine.

Affected configurations

Vulners
Node
jwilkocrodjvuMatch0.4.6-1
VendorProductVersionCPE
jwilkocrodjvu0.4.6-1cpe:2.3:a:jwilk:ocrodjvu:0.4.6-1:*:*:*:*:*:*:*

CVSS2

6.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

AI Score

6.8

Confidence

High

EPSS

0

Percentile

5.1%

Related for GHSA-5PJJ-7M4P-WFH2