Skip to content

PIL and Pillow Vulnerable to Symlink Attack on Tmpfiles

Moderate severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated Aug 16, 2023

Package

pip pillow (pip)

Affected versions

< 2.3.1

Patched versions

2.3.1

Description

The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.

References

Published by the National Vulnerability Database Apr 17, 2014
Published to the GitHub Advisory Database May 17, 2022
Last updated Aug 16, 2023
Reviewed Aug 16, 2023

Severity

Moderate

Weaknesses

CVE ID

CVE-2014-1932

GHSA ID

GHSA-x895-2wrm-hvp7

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.