The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-commons before 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a symlink attack on /tmp/toto.fdf.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-updates/2014-02/msg00085.html | vendor advisory |
http://secunia.com/advisories/57209 | third party advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737051 | |
http://www.logilab.org/ticket/207561 | |
http://comments.gmane.org/gmane.comp.security.oss.general/11986 | mailing list |