PyPi: Paradrop

CVE-2018-20060

Transitive

Safety vulnerability ID: 42700

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Dec 11, 2018 Updated at Nov 07, 2023
Scan your Python projects for vulnerabilities →

Advisory

Paradrop 0.13.0 updates its dependency urllib3 to v1.24.1 to include a security fix.

Affected package

paradrop

Latest version: 0.13.2

ParaDrop wireless virtualization

Affected versions

Fixed versions

Vulnerability changelog

Features

* Enable chutes to install multiple services (e.g. a webserver and a database) as separate containers.
* Major rework of chute configuration syntax to support composing. Please refer to https://paradrop.readthedocs.io/en/v0.12.1/api/chute-configuration.html for details about the new syntax.
* Enable listing of devices connected to LAN bridge (e.g. a wired security camera).
* Enable multiple users to access a node with different permission sets.
* Add ownership information to installed chutes and enforce user access rights.
* Add a trusted user role that can install, update, and remove chutes as long as the changes do not impact another user's chute.
* Enable downloading chute source from git over SSH to work with Paradrop-hosted private repositories.
* Add a settings file for configuration variables that were previously only exposed through environment variables.
* Enable concurrency during the chute build process to provide a better experience when multiple users are sharing access to a node.
* Block chutes from creating monitor mode WiFi interfaces due to continued stability issues. Device owners can override this change in the settings file.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

CRITICAL 9.8

CVSS v3 Details

CRITICAL 9.8
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
HIGH

CVSS v2 Details

MEDIUM 5.0
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
NONE
Availability Impact (A)
NONE