Website META Language: Insecure temporary file usage Multiple insecure temporary file vulnerabilities have been discovered in the Website META Language. wml 2008-03-15 2008-03-15: 01 209927 local 2.0.11-r3 2.0.11-r3

Website META Language is a free and extensible Webdesigner's off-line HTML generation toolkit for Unix.

Temporary files are handled insecurely in the files wml_backend/p1_ipp/ipp.src, wml_contrib/wmg.cgi, and wml_backend/p3_eperl/eperl_sys.c, allowing users to overwrite or delete arbitrary files with the privileges of the user running the program.

Local users can exploit the insecure temporary file vulnerabilities via symlink attacks to perform certain actions with escalated privileges.

Restrict access to the temporary directory to trusted users only.

All Website META Language users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/wml-2.0.11-r3"
CVE-2008-0665 CVE-2008-0666 p-y p-y mfleming