PyPi: Paradrop

CVE-2018-1000808

Transitive

Safety vulnerability ID: 37490

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Oct 08, 2018 Updated at Mar 22, 2023
Scan your Python projects for vulnerabilities →

Advisory

Paradrop 0.13.0 updates its dependency pyOpenSSL to v17.5.0 to include a security fix.

Affected package

paradrop

Latest version: 0.13.2

ParaDrop wireless virtualization

Affected versions

Fixed versions

Vulnerability changelog

Features

* Enable chutes to install multiple services (e.g. a webserver and a database) as separate containers.
* Major rework of chute configuration syntax to support composing. Please refer to https://paradrop.readthedocs.io/en/v0.12.1/api/chute-configuration.html for details about the new syntax.
* Enable listing of devices connected to LAN bridge (e.g. a wired security camera).
* Enable multiple users to access a node with different permission sets.
* Add ownership information to installed chutes and enforce user access rights.
* Add a trusted user role that can install, update, and remove chutes as long as the changes do not impact another user's chute.
* Enable downloading chute source from git over SSH to work with Paradrop-hosted private repositories.
* Add a settings file for configuration variables that were previously only exposed through environment variables.
* Enable concurrency during the chute build process to provide a better experience when multiple users are sharing access to a node.
* Block chutes from creating monitor mode WiFi interfaces due to continued stability issues. Device owners can override this change in the settings file.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 5.9

CVSS v3 Details

MEDIUM 5.9
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
HIGH
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
NONE
Availability Availability (A)
HIGH

CVSS v2 Details

MEDIUM 4.3
Access Vector (AV)
NETWORK
Access Complexity (AC)
MEDIUM
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
NONE
Availability Impact (A)
PARTIAL