Cheetah 0.9.15 and 0.9.16 searches the /tmp
directory for modules before using the paths in the PYTHONPATH
variable, which allows local users to execute arbitrary code via a malicious module in /tmp/
.
{ "nvd_published_at": "2005-05-17T04:00:00Z", "cwe_ids": [ "CWE-427" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-09-18T23:34:20Z" }