PyPi: Onecodex

CVE-2018-18074

Transitive

Safety vulnerability ID: 47994

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Oct 09, 2018 Updated at Dec 03, 2024
Scan your Python projects for vulnerabilities →

Advisory

Onecodex 0.10.0 updates its dependency 'requests' to v2.27.1 to include a security fix.

Affected package

onecodex

Latest version: 0.17.0

One Codex API client and Python library

Affected versions

Fixed versions

Vulnerability changelog

Added

- Adds `download_samples()` function and `onecodex download samples` CLI command for downloading batches of samples as FASTA/Q files
- Adds support for Python 3.9 and 3.10
- Adds support for Apple M1 processors

Changed

- Improves `SampleCollection._collate_results()` runtime by at least 20x
- Improves missing value coercion in `SampleCollection._collate_results()`
- Updates some dependency versions to address security vulnerabilities, performance enhancements, expanded environment support, and easier installation
- `numpy` is no longer required to be installed prior to installing the `onecodex` package
- Relaxes `filelock` dependency version pin
- Changes `helponecodex.com` to `supportonecodex.com` in user messaging

Fixed

- Fixes PCoA/MDS plot URL bug
- Fixes `metric` parameter behavior in `SampleCollection` constructor (it is no longer ignored)

Removed

- Removes Python 2 support
- Removes bash completion
- Removes `Classifications._append_abundance_rollups()` in favor of retrieving `abundance_w_children` metric from One Codex API

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
NONE
Availability Availability (A)
NONE

CVSS v2 Details

MEDIUM 5.0
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
NONE
Availability Impact (A)
NONE