QID 994911

Date Published: 2023-08-21

QID 994911: Python (Pip) Security Update for RPLY (GHSA-9gcf-pq99-rjw3)

The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.6 severity.
  • CVSS V2 rated as Low - 2.1 severity.
  • Solution
    Refer to Github security advisory GHSA-9gcf-pq99-rjw3 for updates and patch information.
    Vendor References

    CVEs related to QID 994911

    Software Advisories
    Advisory ID Software Component Link
    GHSA-9gcf-pq99-rjw3 RPLY URL Logo github.com/advisories/GHSA-9gcf-pq99-rjw3