heltondoria / contato-service

API de contatos em python
0 stars 0 forks source link

CVE-2019-14322 (High) detected in Werkzeug-0.15.4-py2.py3-none-any.whl #12

Open mend-bolt-for-github[bot] opened 5 years ago

mend-bolt-for-github[bot] commented 5 years ago

CVE-2019-14322 - High Severity Vulnerability

Vulnerable Library - Werkzeug-0.15.4-py2.py3-none-any.whl

The comprehensive WSGI web application library.

Library home page: https://files.pythonhosted.org/packages/9f/57/92a497e38161ce40606c27a86759c6b92dd34fcdb33f64171ec559257c02/Werkzeug-0.15.4-py2.py3-none-any.whl

Path to dependency file: /contato-service/requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy: - :x: **Werkzeug-0.15.4-py2.py3-none-any.whl** (Vulnerable Library)

Found in HEAD commit: 9111b6d0e6f360f7df96f6965535697a857ada21

Found in base branch: master

Vulnerability Details

In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.

Publish Date: 2019-07-28

URL: CVE-2019-14322

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14322

Release Date: 2019-07-28

Fix Resolution: 0.15.5


Step up your Open Source Security Game with Mend here

issue-label-bot[bot] commented 5 years ago

Issue-Label Bot is automatically applying the label bug to this issue, with a confidence of 0.89. Please mark this comment with :thumbsup: or :thumbsdown: to give our bot feedback!

Links: app homepage, dashboard and code for this bot.