Link Following Affecting pyxdg package, versions <0.25-4


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-PYXDG-379932
  • published28 Jan 2014
  • disclosed28 Jan 2014

Introduced: 28 Jan 2014

CVE-2014-1624  (opens in a new tab)
CWE-59  (opens in a new tab)

How to fix?

Upgrade Debian:10 pyxdg to version 0.25-4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream pyxdg package and not the pyxdg package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

Race condition in the xdg.BaseDirectory.get_runtime_dir function in python-xdg 0.25 allows local users to overwrite arbitrary files by pre-creating /tmp/pyxdg-runtime-dir-fallback-victim to point to a victim-owned location, then replacing it with a symlink to an attacker-controlled location once the get_runtime_dir function is called.

CVSS Base Scores

version 3.1