First published: Tue Jul 30 2013(Updated: )
Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Luci | =0.26.0 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4482 is considered a high severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-2013-4482, ensure that you upgrade to a patched version of the affected software or remove any untrusted .egg-info files from the working directories.
Users of luci version 0.26.0 on Scientific Linux and Red Hat Enterprise Linux 6.0 are primarily affected by CVE-2013-4482.
CVE-2013-4482 is caused by an untrusted search path vulnerability that allows the execution of malicious files in certain directories.
CVE-2013-4482 cannot be exploited remotely; it requires local access to the system.