QID 994911
Date Published: 2023-08-21
QID 994911: Python (Pip) Security Update for RPLY (GHSA-9gcf-pq99-rjw3)
The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.
Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
Solution
Refer to Github security advisory GHSA-9gcf-pq99-rjw3 for updates and patch information.
Vendor References
- GHSA-9gcf-pq99-rjw3 -
github.com/advisories/GHSA-9gcf-pq99-rjw3
CVEs related to QID 994911
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| GHSA-9gcf-pq99-rjw3 | RPLY |
|