A flaw was found in PackStack. A local user could exploit a symlink attack on a temporary file with a predictable name in the `/tmp` directory. This vulnerability allows the local user to overwrite arbitrary files on the system, potentially leading to system compromise or data corruption.
History

Thu, 30 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Description (1) installer/basedefs.py and (2) modules/ospluginutils.py in PackStack allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp. A flaw was found in PackStack. A local user could exploit a symlink attack on a temporary file with a predictable name in the `/tmp` directory. This vulnerability allows the local user to overwrite arbitrary files on the system, potentially leading to system compromise or data corruption.
Title packstack: insecure use of /tmp in manifest creation Packstack: packstack: arbitrary file overwrite via symlink attack
Weaknesses CWE-59
CPEs cpe:/a:redhat:openstack:4
cpe:/a:redhat:openstack:5::el6
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2013-03-08T21:00:00.000Z

Updated: 2026-04-30T16:33:18.902Z

Reserved: 2012-12-06T00:00:00.000Z

Link: CVE-2013-0261

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2013-03-08T21:55:01.947

Modified: 2026-04-30T17:16:23.093

Link: CVE-2013-0261

cve-icon Redhat

Severity : Moderate

Publid Date: 2013-01-31T00:00:00Z

Links: CVE-2013-0261 - Bugzilla