Skip to content

ocrodjvu is vulnerable to Arbitrary File Modification via symlink attack

Moderate severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated Feb 7, 2024

Package

pip ocrodjvu (pip)

Affected versions

= 0.4.6-1

Patched versions

0.4.6-2

Description

ocrodjvu 0.4.6-1 on Debian GNU/Linux allows local users to modify arbitrary files via a symlink attack on temporary files that are generated when Cuneiform is invoked as the OCR engine.

References

Published by the National Vulnerability Database Jan 20, 2011
Published to the GitHub Advisory Database May 17, 2022
Reviewed Feb 7, 2024
Last updated Feb 7, 2024

Severity

Moderate

EPSS score

0.042%
(5th percentile)

Weaknesses

CVE ID

CVE-2010-4338

GHSA ID

GHSA-5pjj-7m4p-wfh2
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.