-
-
Notifications
You must be signed in to change notification settings - Fork 17
Description
Vulnerable Library - prophet-1.1.4-py3-none-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Found in HEAD commit: b2b2eb325dc81df00162fc7b87524324be1c6492
Vulnerabilities
| CVE | Severity | Dependency | Type | Fixed in (prophet version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2024-34062 | 4.8 | tqdm-4.66.1-py3-none-any.whl | Transitive | 1.1.5 | β | |
| CVE-2024-5569 | 3.3 | zipp-3.15.0-py3-none-any.whl | Transitive | 1.1.5 | β |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-34062
Vulnerable Library - tqdm-4.66.1-py3-none-any.whl
Fast, Extensible Progress Meter
Library home page: https://files.pythonhosted.org/packages/00/e5/f12a80907d0884e6dff9c16d0c0114d81b8cd07dc3ae54c5e962cc83037e/tqdm-4.66.1-py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt,/requirements.txt
Dependency Hierarchy:
- prophet-1.1.4-py3-none-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (Root Library)
- β tqdm-4.66.1-py3-none-any.whl (Vulnerable Library)
Found in HEAD commit: b2b2eb325dc81df00162fc7b87524324be1c6492
Found in base branch: main
Vulnerability Details
tqdm is an open source progress bar for Python and CLI. Any optional non-boolean CLI arguments (e.g. --delim, --buf-size, --manpath) are passed through python's eval, allowing arbitrary code execution. This issue is only locally exploitable and had been addressed in release version 4.66.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Publish Date: 2024-05-03
URL: CVE-2024-34062
CVSS 3 Score Details (4.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: GHSA-g7vv-2v7x-gj9p
Release Date: 2024-05-03
Fix Resolution (tqdm): 4.66.3
Direct dependency fix Resolution (prophet): 1.1.5
Step up your Open Source Security Game with Mend here
CVE-2024-5569
Vulnerable Library - zipp-3.15.0-py3-none-any.whl
Backport of pathlib-compatible object wrapper for zip files
Library home page: https://files.pythonhosted.org/packages/5b/fa/c9e82bbe1af6266adf08afb563905eb87cab83fde00a0a08963510621047/zipp-3.15.0-py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy:
- prophet-1.1.4-py3-none-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (Root Library)
- importlib_resources-5.12.0-py3-none-any.whl
- β zipp-3.15.0-py3-none-any.whl (Vulnerable Library)
- importlib_resources-5.12.0-py3-none-any.whl
Found in HEAD commit: b2b2eb325dc81df00162fc7b87524324be1c6492
Found in base branch: main
Vulnerability Details
A Denial of Service (DoS) vulnerability exists in the jaraco/zipp library, affecting all versions prior to 3.19.1. The vulnerability is triggered when processing a specially crafted zip file that leads to an infinite loop. This issue also impacts the zipfile module of CPython, as features from the third-party zipp library are later merged into CPython, and the affected code is identical in both projects. The infinite loop can be initiated through the use of functions affecting the Path module in both zipp and zipfile, such as joinpath, the overloaded division operator, and iterdir. Although the infinite loop is not resource exhaustive, it prevents the application from responding. The vulnerability was addressed in version 3.19.1 of jaraco/zipp.
Publish Date: 2024-07-09
URL: CVE-2024-5569
CVSS 3 Score Details (3.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: https://huntr.com/bounties/be898306-11f9-46b4-b28c-f4c4aa4ffbae
Release Date: 2024-07-09
Fix Resolution (zipp): 3.19.1
Direct dependency fix Resolution (prophet): 1.1.5
Step up your Open Source Security Game with Mend here