zc_messaging icon indicating copy to clipboard operation
zc_messaging copied to clipboard

CVE-2024-53899 (High) detected in virtualenv-20.9.0-py2.py3-none-any.whl

Open mend-bolt-for-github[bot] opened this issue 1 year ago • 0 comments

CVE-2024-53899 - High Severity Vulnerability

Vulnerable Library - virtualenv-20.9.0-py2.py3-none-any.whl

Virtual Python Environment builder

Library home page: https://files.pythonhosted.org/packages/d2/cb/439d1952bc4cc5be2fb5c2551c94cb039323f2acdc45aa77a3f935d70b16/virtualenv-20.9.0-py2.py3-none-any.whl

Path to dependency file: /backend/requirements.txt

Path to vulnerable library: /backend/requirements.txt,/backend/requirements.txt

Dependency Hierarchy:

  • :x: virtualenv-20.9.0-py2.py3-none-any.whl (Vulnerable Library)

Found in base branch: dev

Vulnerability Details

virtualenv before 20.26.6 allows command injection through the activation scripts for a virtual environment. Magic template strings are not quoted correctly when replacing. NOTE: this is not the same as CVE-2024-9287.

Publish Date: 2024-11-24

URL: CVE-2024-53899

CVSS 3 Score Details (8.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2024-11-24

Fix Resolution: 20.26.6


Step up your Open Source Security Game with Mend here