Symlink Attack Affecting suds-jurko package, versions [0,]


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-SUDSJURKO-1056871
  • published27 Jun 2013
  • disclosed27 Jun 2013
  • creditRolf Krahl

Introduced: 27 Jun 2013

CVE-2013-2217  (opens in a new tab)
CWE-59  (opens in a new tab)

How to fix?

There is no fixed version for suds-jurko.

Overview

Affected versions of this package are vulnerable to Symlink Attack via cache.py . When tempdir is set to None, It allows local users to redirect SOAP queries and possibly have other unspecified impact via a symlink attack on a cache file with a predictable name in /tmp/suds/.

CVSS Scores

version 3.1