PyPi: Rasa-Sdk

CVE-2020-1747

Transitive

Safety vulnerability ID: 38229

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Mar 24, 2020 Updated at Oct 30, 2024
Scan your Python projects for vulnerabilities →

Advisory

Rasa 1.10.0 updates 'pyyaml' dependency to 5.3.1 to fix CVE-2020-1747.

Affected package

rasa-sdk

Latest version: 3.10.1

Open source machine learning framework to automate text- and voice-based conversations: NLU, dialogue management, connect to Slack, Facebook, and more - Create chatbots and voice assistants

Affected versions

Fixed versions

Vulnerability changelog

^^^^^^^^^^^^^^^^^^^^^

Features
--------
- `164 <https://github.com/rasahq/rasa/issues/164>`_: Added new ``--auto-reload`` CLI argument. When specified, modules containing ``Action``
subclasses will be automatically reloaded if they have been modified since the last HTTP
request. By using this, one can avoid having to re-start the actions server when
developing new actions.
- `3765 <https://github.com/rasahq/rasa/issues/3765>`_: Add support for entities with role and group labels.

If you use ``from_entity`` in your custom slot mapping, you can now also specify a role and group label.
If you set a role or group label, the slot is only filled if the entity has the specific role or group label set.
If you don't specify a role or group label, the function behaves as before.

Improvements
------------
- `176 <https://github.com/rasahq/rasa/issues/176>`_: The Rasa SDK image now uses Python 3.7 instead of Python 3.6.

Bugfixes
--------
- `176 <https://github.com/rasahq/rasa/issues/176>`_: Updated ``pyyaml`` dependency to ``5.3.1`` to fix
`CVE-2020-1747 <https://security-tracker.debian.org/tracker/CVE-2020-1747>`_

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

CRITICAL 9.8

CVSS v3 Details

CRITICAL 9.8
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
HIGH

CVSS v2 Details

HIGH 10.0
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
COMPLETE
Integrity Impact (I)
COMPLETE
Availability Impact (A)
COMPLETE