Symlink Vulnerability in Python Imaging Library Affecting Multiple Versions
CVE-2014-1933
Currently unrated
Summary
The Python Imaging Library (PIL) versions 1.1.7 and earlier, along with Pillow versions prior to 2.3.1, are susceptible to a symlink attack due to an insecure handling of temporary file names. This vulnerability enables local users to list processes that use temporary files on the command line, potentially allowing malicious actions through symbolic link manipulation. This risk highlights the importance of implementing secure coding practices and user permissions to mitigate unauthorized access.
References
Timeline
Vulnerability published
Vulnerability Reserved