First published: Tue Jan 28 2014(Updated: )
The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/RPLY | <0.7.1 | 0.7.1 |
Python Rply | <=0.7.0 | |
<=0.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1604 is considered a low-severity vulnerability due to its local exploitation scenario.
To fix CVE-2014-1604, upgrade RPLY to version 0.7.1 or later.
CVE-2014-1604 affects RPLY versions earlier than 0.7.1, commonly used in Python applications.
CVE-2014-1604 allows local users to spoof cache data by pre-creating temporary JSON files with predictable names.
No, CVE-2014-1604 cannot be exploited remotely as it requires local access to the vulnerable system.