Safety vulnerability ID: 42353
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Croud 0.3.0 includes a fix for CVE-2017-18342, an arbitrary code execution vulnerability in yaml.load().
https://github.com/crate/croud/commit/821f2ba47285f5b5ad3e2e2782c44f867da931ee
Latest version: 1.12.0
A command line interface for CrateDB Cloud
==================
- SECURITY: prevented arbitrary code execution when loading the config file
(ref. `CVE-2017-18342 <https://nvd.nist.gov/vuln/detail/CVE-2017-18342>`_)
- Fix: Login page needs to be picked according to the env set in current_context.
- Removed `env` subcommand (replaced with `config set --env [prod|env]`)
- Added subcommand `config get` that prints out a specified default config setting
- Added subcommand `config set` that sets a specified default config setting
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application