Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.
References
Configurations
Information
Published : 2008-09-18 10:59
Updated : 2017-08-07 18:32
NVD link : CVE-2008-4108
Mitre link : CVE-2008-4108
JSON object : View
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
Products Affected
python_software_foundation
- python