1.2
CVE-2011-4617
- EPSS 0.04%
- Published 31.12.2011 01:55:00
- Last modified 11.04.2025 00:51:21
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
virtualenv.py in virtualenv before 1.5 allows local users to overwrite arbitrary files via a symlink attack on a certain file in /tmp/.
Data is provided by the National Vulnerability Database (NVD)
Python ≫ Virtualenv Version <= 1.4.9
Python ≫ Virtualenv Version0.8
Python ≫ Virtualenv Version0.8.1
Python ≫ Virtualenv Version0.8.2
Python ≫ Virtualenv Version0.8.3
Python ≫ Virtualenv Version0.8.4
Python ≫ Virtualenv Version0.9
Python ≫ Virtualenv Version0.9.1
Python ≫ Virtualenv Version0.9.2
Python ≫ Virtualenv Version1.0
Python ≫ Virtualenv Version1.1
Python ≫ Virtualenv Version1.1.1
Python ≫ Virtualenv Version1.2
Python ≫ Virtualenv Version1.3
Python ≫ Virtualenv Version1.3.1
Python ≫ Virtualenv Version1.3.2
Python ≫ Virtualenv Version1.3.3
Python ≫ Virtualenv Version1.3.4
Python ≫ Virtualenv Version1.4
Python ≫ Virtualenv Version1.4.1
Python ≫ Virtualenv Version1.4.2
Python ≫ Virtualenv Version1.4.3
Python ≫ Virtualenv Version1.4.4
Python ≫ Virtualenv Version1.4.5
Python ≫ Virtualenv Version1.4.6
Python ≫ Virtualenv Version1.4.7
Python ≫ Virtualenv Version1.4.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.1 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 1.2 | 1.9 | 2.9 |
AV:L/AC:H/Au:N/C:N/I:P/A:N
|
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.