Athena-CoFee icon indicating copy to clipboard operation
Athena-CoFee copied to clipboard

gevent-1.3.6-cp37-cp37m-manylinux1_x86_64.whl: 1 vulnerabilities (highest severity is: 9.8)

Open mend-bolt-for-github[bot] opened this issue 1 year ago • 0 comments

Vulnerable Library - gevent-1.3.6-cp37-cp37m-manylinux1_x86_64.whl

Coroutine-based network library

Library home page: https://files.pythonhosted.org/packages/c9/36/483097f7eae9e984c88cb192b33eca0234eb0bafdc6c9646586b8dbc96b4/gevent-1.3.6-cp37-cp37m-manylinux1_x86_64.whl

Path to dependency file: /embedding/requirements.txt

Path to vulnerable library: /embedding/requirements.txt

Found in HEAD commit: f548525baaf6d16b6a6edc667027ce1b0516e50f

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (gevent version) Remediation Possible**
CVE-2023-41419 Critical 9.8 gevent-1.3.6-cp37-cp37m-manylinux1_x86_64.whl Direct 23.9.0

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2023-41419

Vulnerable Library - gevent-1.3.6-cp37-cp37m-manylinux1_x86_64.whl

Coroutine-based network library

Library home page: https://files.pythonhosted.org/packages/c9/36/483097f7eae9e984c88cb192b33eca0234eb0bafdc6c9646586b8dbc96b4/gevent-1.3.6-cp37-cp37m-manylinux1_x86_64.whl

Path to dependency file: /embedding/requirements.txt

Path to vulnerable library: /embedding/requirements.txt

Dependency Hierarchy:

  • :x: gevent-1.3.6-cp37-cp37m-manylinux1_x86_64.whl (Vulnerable Library)

Found in HEAD commit: f548525baaf6d16b6a6edc667027ce1b0516e50f

Found in base branch: main

Vulnerability Details

An issue in Gevent before version 23.9.0 allows a remote attacker to escalate privileges via a crafted script to the WSGIServer component.

Publish Date: 2023-09-25

URL: CVE-2023-41419

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2023-09-25

Fix Resolution: 23.9.0

Step up your Open Source Security Game with Mend here