pleaseedit in please before 0.4 uses predictable temporary filenames in /tmp and the target directory. This allows a local attacker to gain full root privileges by staging a symlink attack.
https://www.openwall.com/lists/oss-security/2021/05/18/1
https://gitlab.com/edneville/please/-/tree/master/src/bin
Source: Mitre, NVD
Published: 2021-05-27
Updated: 2024-11-21
Base Score: 7.2
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H