PyPi: Rucio

CVE-2022-24302

Transitive

Safety vulnerability ID: 64134

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Mar 17, 2022 Updated at Dec 12, 2024
Scan your Python projects for vulnerabilities →

Advisory

Rucio 1.26.12 updates its dependency on Paramiko to version 2.10.3 from the earlier 2.7.2, in response to the security vulnerability identified as CVE-2022-24302.

Affected package

rucio

Latest version: 36.0.0

Rucio Package

Affected versions

Fixed versions

Vulnerability changelog

General

Enhancements

- Release management: Update paramiko dependency due to security advisory 5412
- Release management: Pin the `werkzeug` package version prior to 2.1.0 in Flask 1.1.2 versions 5419
- Replicas: geoip database is always downloaded, even if no URL configured/License key given 5233
- Testing: Print the integration test server logs in the actions 5253

Bugs

- Jinja2 3.1.0 is incompatible with Flask 1.1.2 5398
- Release management: Flask fails after itsdangerous module’s update 5258
- Testing: test_upload_download of test-server fails 5023
- Testing: `common/test_rucio_server` file path bug 5037

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 5.9

CVSS v3 Details

MEDIUM 5.9
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
HIGH
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
NONE
Availability Availability (A)
NONE

CVSS v2 Details

MEDIUM 4.3
Access Vector (AV)
NETWORK
Access Complexity (AC)
MEDIUM
Authentication (Au)
NONE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
NONE
Availability Impact (A)
NONE