Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. Pillow
  4. ›
  5. CVE-2014-1932

CVE-2014-1932: PIL and Pillow Vulnerable to Symlink Attack on Tmpfiles

May 17, 2022 (updated October 9, 2024)

The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.

References

  • bugs.debian.org/cgi-bin/bugreport.cgi?bug=737059
  • github.com/advisories/GHSA-x895-2wrm-hvp7
  • github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2014-22.yaml
  • github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7
  • github.com/python-pillow/Pillow
  • nvd.nist.gov/vuln/detail/CVE-2014-1932
  • security.gentoo.org/glsa/201612-52
  • web.archive.org/web/20170103151725/http://www.securityfocus.com/bid/65511

Code Behaviors & Features

Detect and mitigate CVE-2014-1932 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.3.1

Fixed versions

  • 2.3.1

Solution

Upgrade to version 2.3.1 or above.

Impact 7.7 HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-59: Improper Link Resolution Before File Access ('Link Following')

Source file

pypi/Pillow/CVE-2014-1932.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:37 +0000.