First published: Wed Jul 29 2020(Updated: )
This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Gerapy Gerapy | >=0.0.0<0.9.3 | |
pip/gerapy | <0.9.3 | 0.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7698
The severity of CVE-2020-7698 is critical with a severity value of 9.8.
The package Gerapy versions 0 up to, but not including, 0.9.3 are affected by CVE-2020-7698.
The input being passed to Popen, via the project_configure endpoint, in Gerapy is not being properly sanitized.
Yes, updating Gerapy to version 0.9.3 or later will fix CVE-2020-7698.