First published: Thu Jun 27 2013(Updated: )
cache.py in Suds 0.4, when tempdir is set to None, allows local users to redirect SOAP queries and possibly have other unspecified impact via a symlink attack on a cache file with a predictable name in /tmp/suds/.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/suds-py3 | >=0<1.4.4.1 | 1.4.4.1 |
pip/suds | <=0.4 | 1.0.0 |
Suds by Jeff Ortel | =0.4 | |
SUSE Linux | =12.2 | |
SUSE Linux | =12.3 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2217 is classified as a moderate severity vulnerability due to its potential for local exploitation.
To fix CVE-2013-2217, upgrade to the latest version of Suds or Suds-Py3, specifically version 1.4.4.1 or higher.
CVE-2013-2217 affects Suds versions up to 0.4 and is relevant for certain versions of openSUSE and Red Hat Enterprise Linux.
CVE-2013-2217 can be exploited through a symlink attack targeting a cache file created in the /tmp/suds/ directory.
No, CVE-2013-2217 is a local vulnerability and requires access to the affected system to exploit.