CVE-2014-1932 — Link Following in Pillow
Severity
10.0CRITICALNVD
NVD4.4CNA4.4GHSA4.4OSV4.4
EPSS
0.1%
top 73.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 17
Latest updateMay 17
Description
The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.
CVSS vector
AV:L/AC:M/C:P/I:P/A:PExploitability: 3.4 | Impact: 6.4