Lucene search

K
githubGitHub Advisory DatabaseGHSA-9GCF-PQ99-RJW3
HistoryMay 17, 2022 - 1:27 a.m.

RPLY Predictable Tmpfile Names Allows Cache Spoofing

2022-05-1701:27:10
CWE-377
GitHub Advisory Database
github.com
2

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

0.0004 Low

EPSS

Percentile

5.1%

The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.

Affected configurations

Vulners
Node
rply_projectrplyRange<0.7.1
CPENameOperatorVersion
rplylt0.7.1

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

0.0004 Low

EPSS

Percentile

5.1%

Related for GHSA-9GCF-PQ99-RJW3