A PyInstaller built application, elevated as a privileged process, may be tricked by an unprivileged attacker into deleting files the unprivileged user does not otherwise have access to.
A user is affected if all the following are satisfied:
matplotlib
or win32com
.TMP
/TEMP
environment variables pointing to an unprotected, arbitrary, non default location).shutil.rmtree()
's builtin symlink check and the deletion itselfThe vulnerability has been addressed in https://github.com/pyinstaller/pyinstaller/pull/7827 which corresponds to pyinstaller >= 5.13.1
Is there a way for users to fix or remediate the vulnerability without upgrading?
No workaround, although the attack complexity becomes much higher if the application is built with Python >= 3.8.0.
{ "nvd_published_at": "2023-12-09T01:15:07Z", "cwe_ids": [ "CWE-379", "CWE-732" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-12-09T00:39:46Z" }