PyPi: Tethys-Platform

CVE-2020-11023

Transitive

Safety vulnerability ID: 44920

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Apr 29, 2020 Updated at Feb 15, 2025
Scan your Python projects for vulnerabilities →

Advisory

Tethys-platform 3.2.0 updates its dependency 'jQuery' to v3.5.1 to include security fixes.

Affected package

tethys-platform

Latest version: 3.4.2.dev2

Primary Tethys Platform Django Site Project

Affected versions

Fixed versions

Vulnerability changelog

Release Notes:

* Multi-Factor Authentication for Tethys Portal
* Additional Single Sign-On Backends: Azure Active Directory, Active Directory Federation Services (AD FS), OneLogin, Okta.
* Automatic Lockout for Tethys Portal
* Various Jobs Table Improvements
* Additional MVLayers features supported in Cesium Map View
* Update jQuery to 3.5.1 to address known vulnerabilities.
* Documentation for configuring REDIS for Tethys Platform in production.
* Fixed an issue with the tethys command line interface not working on systems without Docker installed.
* Fixed issue with Add User admin page that would prevent adding additional users after the first user was added.
* Modified the Condor Scheduler admin pages to use the PasswordInput field for the password fields.
* Updated the default ASGI configuration file so that it can be killed properly by supervisor when stopped.

For more information see [What's New Article](http://docs.tethysplatform.org/en/stable/whats_new.html)

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 6.1

CVSS v3 Details

MEDIUM 6.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
CHANGED
Confidentiality Impact (C)
LOW
Integrity Impact (I)
LOW
Availability Availability (A)
NONE

CVSS v2 Details

MEDIUM 4.3
Access Vector (AV)
NETWORK
Access Complexity (AC)
MEDIUM
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
PARTIAL
Availability Impact (A)
NONE