Vulnerability Description
Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Scientificlinux | Luci | 0.26.0 |
| Redhat | Enterprise Linux | 6.0 |
References
- http://rhn.redhat.com/errata/RHSA-2013-1603.htmlVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=990321
- http://rhn.redhat.com/errata/RHSA-2013-1603.htmlVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=990321
FAQ
What is CVE-2013-4482?
CVE-2013-4482 is a vulnerability with a CVSS score of 6.2 (MEDIUM). Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in th...
How severe is CVE-2013-4482?
CVE-2013-4482 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4482?
Check the references section above for vendor advisories and patch information. Affected products include: Scientificlinux Luci, Redhat Enterprise Linux.