Safety vulnerability ID: 51242
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of Joblib are vulnerable to Arbitrary Code Execution via the pre_dispatch flag in Parallel() class due to the eval() statement.
Latest version: 1.4.2
Lightweight pipelining with Python functions
The package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary Code Execution via the pre_dispatch flag in Parallel() class due to the eval() statement. See CVE-2022-21797.
MISC:https://github.com/joblib/joblib/commit/b90f10efeb670a2cc877fb88ebb3f2019189e059: https://github.com/joblib/joblib/commit/b90f10efeb670a2cc877fb88ebb3f2019189e059
MISC:https://github.com/joblib/joblib/issues/1128: https://github.com/joblib/joblib/issues/1128
MISC:https://github.com/joblib/joblib/pull/1321: https://github.com/joblib/joblib/pull/1321
MISC:https://security.snyk.io/vuln/SNYK-PYTHON-JOBLIB-3027033: https://security.snyk.io/vuln/SNYK-PYTHON-JOBLIB-3027033
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application