GHSA-5pjj-7m4p-wfh2

Suggest an improvement
Source
https://github.com/advisories/GHSA-5pjj-7m4p-wfh2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-5pjj-7m4p-wfh2/GHSA-5pjj-7m4p-wfh2.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-5pjj-7m4p-wfh2
Aliases
Published
2022-05-17T02:04:28Z
Modified
2024-02-07T22:56:48.316144Z
Summary
ocrodjvu is vulnerable to Arbitrary File Modification via symlink attack
Details

ocrodjvu 0.4.6-1 on Debian GNU/Linux allows local users to modify arbitrary files via a symlink attack on temporary files that are generated when Cuneiform is invoked as the OCR engine.

Database specific
{
    "nvd_published_at": "2011-01-20T19:00:00Z",
    "cwe_ids": [
        "CWE-59"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-02-07T22:40:09Z"
}
References

Affected packages

PyPI / ocrodjvu

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.4.6-1
Fixed
0.4.6-2

Affected versions

0.*

0.4.6-1