Safety vulnerability ID: 47025
The information on this page was manually curated by our Cybersecurity Intelligence Team.
[This advisory has been limited. Please create a free account to view the full advisory.]
Latest version: 2.2.1
Python dependency management and packaging made easy.
[This affected versions has been limited. Please create a free account to view the full affected versions.]
[This fixed versions has been limited. Please create a free account to view the full fixed versions.]
Poetry v1.1.9 and below was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute Poetry commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS. See CVE-2022-26184.
MISC:https://github.com/python-poetry/poetry-core/pull/205/commits/fa9cb6f358ae840885c700f954317f34838caba7: https://github.com/python-poetry/poetry-core/pull/205/commits/fa9cb6f358ae840885c700f954317f34838caba7
MISC:https://github.com/python-poetry/poetry/releases/tag/1.1.9: https://github.com/python-poetry/poetry/releases/tag/1.1.9
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application