A PyInstaller built application, elevated as a privileged process, may be tricked by an unprivileged attacker into deleting files the unprivileged user does not otherwise have access to.
A user is affected if all the following are satisfied:
matplotlib or win32com.TMP/TEMP environment variables pointing to an unprotected, arbitrary, non default location).The vulnerability has been addressed in https://github.com/pyinstaller/pyinstaller/pull/7827 which corresponds to pyinstaller >= 5.13.1
Is there a way for users to fix or remediate the vulnerability without upgrading?
No workaround, although the attack complexity becomes much higher if the application is built with Python >= 3.8.0.
{
"severity": "HIGH",
"nvd_published_at": "2023-12-09T01:15:07Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-379",
"CWE-732"
],
"github_reviewed_at": "2023-12-09T00:39:46Z"
}