First published: Thu Apr 17 2014(Updated: )
The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Pillow | <2.3.1 | 2.3.1 |
Python Imaging Library (Pillow) | <=2.3.0 | |
Python Imaging Library (PIL) | <=1.1.7 | |
debian/pillow | 8.1.2+dfsg-0.3+deb11u2 9.4.0-1.1+deb12u1 11.1.0-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1933 is classified as a moderate severity vulnerability.
To fix CVE-2014-1933, upgrade Pillow to version 2.3.1 or later or update the Python Imaging Library to version 1.1.7 or later.
CVE-2014-1933 allows local users to conduct symlink attacks, potentially compromising system security.
Pillow versions prior to 2.3.1 are affected by CVE-2014-1933.
Vulnerable versions of the Python Imaging Library include 1.1.7 and earlier.