PyPi: Paradrop

CVE-2018-18074

Transitive

Safety vulnerability ID: 42701

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Oct 09, 2018 Updated at Mar 22, 2023
Scan your Python projects for vulnerabilities →

Advisory

Paradrop 0.13.0 updates its dependency requests to v2.20.1 to include a security fix.

Affected package

paradrop

Latest version: 0.13.2

ParaDrop wireless virtualization

Affected versions

Fixed versions

Vulnerability changelog

Features

* Enable chutes to install multiple services (e.g. a webserver and a database) as separate containers.
* Major rework of chute configuration syntax to support composing. Please refer to https://paradrop.readthedocs.io/en/v0.12.1/api/chute-configuration.html for details about the new syntax.
* Enable listing of devices connected to LAN bridge (e.g. a wired security camera).
* Enable multiple users to access a node with different permission sets.
* Add ownership information to installed chutes and enforce user access rights.
* Add a trusted user role that can install, update, and remove chutes as long as the changes do not impact another user's chute.
* Enable downloading chute source from git over SSH to work with Paradrop-hosted private repositories.
* Add a settings file for configuration variables that were previously only exposed through environment variables.
* Enable concurrency during the chute build process to provide a better experience when multiple users are sharing access to a node.
* Block chutes from creating monitor mode WiFi interfaces due to continued stability issues. Device owners can override this change in the settings file.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
NONE
Availability Availability (A)
NONE

CVSS v2 Details

MEDIUM 5.0
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
NONE
Availability Impact (A)
NONE