PyPi: Exasol-Python-Test-Framework

CVE-2022-23491

Transitive

Safety vulnerability ID: 72063

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Dec 07, 2022 Updated at Jul 31, 2024
Scan your Python projects for vulnerabilities →

Advisory

Exasol-python-test-framework updates its certifi dependency to address a security vulnerability identified as CVE-2022-23491.

Affected package

exasol-python-test-framework

Latest version: 0.6.1

Python Test framework for Exasol database tests

Affected versions

Fixed versions

Vulnerability changelog

Summary

This release updates the minimal Python version to 3.10. Also it adds a mechanism to read the environment info from the test container.

Features

- 59: Implemented a mechanism to read the environment info from the test container

Bugs

n/a

Documentation

n/a

Refactoring

- 56: Updated to Python 3.10

Security

⚠️ Attention ⚠️

Security vulnerabilities have been addressed, hence we advise users of
our library to update and check the security of their own dependency tree.
E.g. by using a vulnerability scanner like [trivy](https://aquasecurity.github.io/trivy/v0.17.2/).

* Updated dependencies to address security issue (internal: poetry.lock)
* CVE-2022-23491
* CVE-2022-40897
* CVE-2022-24439

Dependency updates

Compile Dependency Updates

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
HIGH
Availability Availability (A)
NONE