PyPi: Suds-Community

CVE-2013-2217

Safety vulnerability ID: 36562

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Sep 23, 2013 Updated at Aug 24, 2024
Scan your Python projects for vulnerabilities →

Advisory

Suds-community 0.7.0 addresses CVE-2013-2217.

Affected package

suds-community

Latest version: 1.2.0

Lightweight SOAP client (community fork)

Affected versions

Fixed versions

Vulnerability changelog

- Static (automatic)
`Import.bind('http://schemas.xmlsoap.org/soap/encoding/')`, users no
longer need to do this.
- Basic ws-security with {{{UsernameToken}}} and clear-text password
only.
- Add support for `sparse` SOAP headers via passing dictionary.
- Add support for arbitrary user defined SOAP headers.
- Fixes service operations with multiple SOAP header entries.
- Schema loading and dereferencing algorithm enhancements.
- Nested SOAP multirefs fixed.
- Better (true) support for `elementFormDefault="unqualified"`
provides more accurate namespacing.
- WSDL part types no longer default to WSDL `targetNamespace`.
- Fixed Tickets: 4, 6, 21, 32, 62, 66, 71, 72, 114,
155, 201.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

LOW 1.2

CVSS v2 Details

LOW 1.2
Access Vector (AV)
LOCAL
Access Complexity (AC)
HIGH
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
PARTIAL
Availability Impact (A)
NONE