CVE-2022-21699 (High) detected in ipython-5.10.0-py2-none-any.whl
mend-bolt-for-github opened this issue · 0 comments
CVE-2022-21699 - High Severity Vulnerability
Vulnerable Library - ipython-5.10.0-py2-none-any.whl
IPython: Productive Interactive Computing
Library home page: https://files.pythonhosted.org/packages/ce/2c/2849a2b37024a01a847c87d81825c0489eb22ffc6416cac009bf281ea838/ipython-5.10.0-py2-none-any.whl
Path to dependency file: /backend/requirements.txt
Path to vulnerable library: /backend/requirements.txt,/requirements.txt
Dependency Hierarchy:
- streamlit-0.55.2-py2.py3-none-any.whl (Root Library)
- pydeck-0.5.0-py2.py3-none-any.whl
- ❌ ipython-5.10.0-py2-none-any.whl (Vulnerable Library)
- pydeck-0.5.0-py2.py3-none-any.whl
Found in base branch: main
Vulnerability Details
IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade.
Publish Date: 2022-01-19
URL: CVE-2022-21699
CVSS 3 Score Details (8.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-pq7m-3gw7-gq5x
Release Date: 2022-01-19
Fix Resolution (ipython): 7.16.3
Direct dependency fix Resolution (streamlit): 0.56.0
Step up your Open Source Security Game with Mend here