The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-commons before 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a symlink attack on /tmp/toto.fdf.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Opensuse | Opensuse | 12.3 (including) | 12.3 (including) |
| Opensuse | Opensuse | 13.1 (including) | 13.1 (including) |
| Logilab-common | Ubuntu | artful | * |
| Logilab-common | Ubuntu | lucid | * |
| Logilab-common | Ubuntu | precise | * |
| Logilab-common | Ubuntu | quantal | * |
| Logilab-common | Ubuntu | saucy | * |
| Logilab-common | Ubuntu | trusty | * |
| Logilab-common | Ubuntu | utopic | * |
| Logilab-common | Ubuntu | vivid | * |
| Logilab-common | Ubuntu | wily | * |
| Logilab-common | Ubuntu | yakkety | * |
| Logilab-common | Ubuntu | zesty | * |