Open mend-for-github-com[bot] opened 2 years ago
Lightweight pipelining with Python functions
Library home page: https://files.pythonhosted.org/packages/3e/d5/0163eb0cfa0b673aa4fe1cd3ea9d8a81ea0f32e50807b0c295871e4aab2e/joblib-1.1.0-py2.py3-none-any.whl
Path to dependency file: /projects/Web_page_summation/requirements.txt
Path to vulnerable library: /projects/Web_page_summation/requirements.txt,/projects/Web_page_summation/requirements.txt
Found in HEAD commit: bf2f317cb6b371fa8ba87f3a9f45a7dde720c061
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Dependency Hierarchy: - :x: **joblib-1.1.0-py2.py3-none-any.whl** (Vulnerable Library)
Found in base branch: master
The package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary Code Execution via the pre_dispatch flag in Parallel() class due to the eval() statement.
Publish Date: 2022-09-26
URL: CVE-2022-21797
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low
Type: Upgrade version
Release Date: 2022-09-26
Fix Resolution: 1.2.0
:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.
Vulnerable Library - joblib-1.1.0-py2.py3-none-any.whl
Lightweight pipelining with Python functions
Library home page: https://files.pythonhosted.org/packages/3e/d5/0163eb0cfa0b673aa4fe1cd3ea9d8a81ea0f32e50807b0c295871e4aab2e/joblib-1.1.0-py2.py3-none-any.whl
Path to dependency file: /projects/Web_page_summation/requirements.txt
Path to vulnerable library: /projects/Web_page_summation/requirements.txt,/projects/Web_page_summation/requirements.txt
Found in HEAD commit: bf2f317cb6b371fa8ba87f3a9f45a7dde720c061
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2022-21797
### Vulnerable Library - joblib-1.1.0-py2.py3-none-any.whlLightweight pipelining with Python functions
Library home page: https://files.pythonhosted.org/packages/3e/d5/0163eb0cfa0b673aa4fe1cd3ea9d8a81ea0f32e50807b0c295871e4aab2e/joblib-1.1.0-py2.py3-none-any.whl
Path to dependency file: /projects/Web_page_summation/requirements.txt
Path to vulnerable library: /projects/Web_page_summation/requirements.txt,/projects/Web_page_summation/requirements.txt
Dependency Hierarchy: - :x: **joblib-1.1.0-py2.py3-none-any.whl** (Vulnerable Library)
Found in HEAD commit: bf2f317cb6b371fa8ba87f3a9f45a7dde720c061
Found in base branch: master
### Vulnerability DetailsThe package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary Code Execution via the pre_dispatch flag in Parallel() class due to the eval() statement.
Publish Date: 2022-09-26
URL: CVE-2022-21797
### CVSS 3 Score Details (7.3)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Release Date: 2022-09-26
Fix Resolution: 1.2.0
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.