PyPi: Polyaxon

CVE-2019-10744

Transitive

Safety vulnerability ID: 38025

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jul 26, 2019 Updated at Jan 03, 2025
Scan your Python projects for vulnerabilities →

Advisory

Polyaxon 0.5.1 updates its NPM dependency 'lodash' to v4.17.14: vulnerability issue.

Affected package

polyaxon

Latest version: 2.6.0

Command Line Interface (CLI) and client to interact with Polyaxon API.

Affected versions

Fixed versions

Vulnerability changelog

* Add possibility to specify pod annotations for jobs/experiments/builds/notebooks/tensorboards.
* By default polyaxon will inject necessary annotations, e.g. when using TPU.
* Users can now define default annotations for each primitive cluster wide.
* Polyaxonfile spec allows to override the annotations per run.
* Add possibility to specify custom pod labels for jobs/experiments/builds/notebooks/tensorboards.
* By default polyaxon uses recommended k8s labels for all managed resources.
* Users can now define default custom labels for each primitive cluster wide.
* Polyaxonfile spec allows to override the labels per run.
* N.B. The custom labels cannot override Polyaxon's required labels.
* strengthen statuses check and fall back to db check if keys are evicted.
* Disable namespace monitoring by default.
* Disable containers resources monitoring by default.
* Expose several celery options by worker type.
* Force rabbitmq confirmation when used as a broker by default.
* Add gzip to list APIs by default
* Remove parts requiring privileged mode when deploying Polyaxon.
* Fix in-cluster redis node scheduling docs: uses master/slave.
* Fix Helm chart validation when disabling docker-registry.
* Fix issue detecting some local configs when running polyaxonfiles locally (use_https was not detected correctly).
* Fix quick creation modes in UI.
* Fix route for creating Tensorboard in UI.
* Fix UI issues noticed in offline deployment: self-host all styling requirements.
* Fix spelling in UI.
* Fix polyaxonfile spec unable to handle quotes in commands.
* Update lodash: vulnerability issue.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

CRITICAL 9.1

CVSS v3 Details

CRITICAL 9.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
HIGH
Availability Availability (A)
HIGH

CVSS v2 Details

MEDIUM 6.4
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
PARTIAL
Availability Impact (A)
PARTIAL