PyPi: Diffsync

CVE-2021-29510

Transitive

Safety vulnerability ID: 44673

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 13, 2021 Updated at Nov 29, 2024
Scan your Python projects for vulnerabilities →

Advisory

Diffsync 1.4.0 updates its dependency 'pydantic' minimum version to v1.7.4 to include a security fix.

Affected package

diffsync

Latest version: 2.0.1

Library to easily sync/diff/update 2 different data sources

Affected versions

Fixed versions

Vulnerability changelog

Added

- 53 - Add a new example based on pynautobot and Nautobot REST API
- 59 - Add proper documentation published in Read the doc
- 68 - Cleanup Readme, add link to new documentation site
- 70 - Add `add_or_update()` method to DiffSync class that requires a DiffSyncModel to be passed in and will attempt to add or update an existing object
- 72 - Add core engine section in docs and rename example directories
- 75 - Add support for Structlog v21 in addition to v20.
- 80 - Add support for an existing Diff object to be passed to `sync_to()` & `sync_from()` to prevent another diff from being calculated.
- 81 - Add a new example based on PeeringDB
- 83 - Add support for Python 3.10
- 87 - Add new model flags : `SKIP_UNMATCHED_BOTH`, `SKIP_UNMATCHED_SRC` & `SKIP_UNMATCHED_DST` to match the behavior of the global flags

Changed

- 62 - Update CI Token
- 69 - Replace Travis CI with Github Actions to run unit tests
- 82 - Update lock file with latest versions.
- 90 - Convert list of actions (`create`, `update`, `delete`) to proper Enum

Fixed

- 51 - Update minimum Pydantic version due to security advisory GHSA-5jqp-qgf6-3pvh
- 63 - Fix type in Readme

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
NONE
Availability Availability (A)
HIGH

CVSS v2 Details

MEDIUM 5.0
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
NONE
Availability Impact (A)
PARTIAL