Closed mend-bolt-for-github[bot] closed 4 years ago
The comprehensive WSGI web application library.
Library home page: https://files.pythonhosted.org/packages/20/c4/12e3e56473e52375aa29c4764e70d1b8f3efa6682bef8d0aae04fe335243/Werkzeug-0.14.1-py2.py3-none-any.whl
Path to dependency file: /tmp/ws-scm/cSync/client/requirements.txt
Path to vulnerable library: /tmp/ws-scm/cSync/client/requirements.txt
Dependency Hierarchy: - Flask-1.0.2-py2.py3-none-any.whl (Root Library) - :x: **Werkzeug-0.14.1-py2.py3-none-any.whl** (Vulnerable Library)
Found in HEAD commit: 7c21248453980c2d0acb57d6c88408025d21b31e
Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.
Publish Date: 2019-08-09
URL: CVE-2019-14806
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
Type: Upgrade version
Origin: https://palletsprojects.com/blog/werkzeug-0-15-3-released/
Release Date: 2019-08-09
Fix Resolution: 0.15.3
Step up your Open Source Security Game with WhiteSource here
구버전에서 사용하던 패키지로 이제는 사용하지 않음
CVE-2019-14806 - High Severity Vulnerability
Vulnerable Library - Werkzeug-0.14.1-py2.py3-none-any.whl
The comprehensive WSGI web application library.
Library home page: https://files.pythonhosted.org/packages/20/c4/12e3e56473e52375aa29c4764e70d1b8f3efa6682bef8d0aae04fe335243/Werkzeug-0.14.1-py2.py3-none-any.whl
Path to dependency file: /tmp/ws-scm/cSync/client/requirements.txt
Path to vulnerable library: /tmp/ws-scm/cSync/client/requirements.txt
Dependency Hierarchy: - Flask-1.0.2-py2.py3-none-any.whl (Root Library) - :x: **Werkzeug-0.14.1-py2.py3-none-any.whl** (Vulnerable Library)
Found in HEAD commit: 7c21248453980c2d0acb57d6c88408025d21b31e
Vulnerability Details
Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.
Publish Date: 2019-08-09
URL: CVE-2019-14806
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://palletsprojects.com/blog/werkzeug-0-15-3-released/
Release Date: 2019-08-09
Fix Resolution: 0.15.3
Step up your Open Source Security Game with WhiteSource here