PyPi: Pycape

CVE-2022-4203

Transitive

Safety vulnerability ID: 53121

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Feb 24, 2023 Updated at Feb 05, 2024
Scan your Python projects for vulnerabilities →

Advisory

Pycape 3.0.0 updates its dependency 'cryptography' to v39.0.1 to include security fixes.

Affected package

pycape

Latest version: 3.1.1

The Cape Privacy Python SDK

Affected versions

Fixed versions

Vulnerability changelog

Breaking Changes
Function tokens have been removed from latest versions of Cape SDKs; the new authentication method is to use [personal access tokens](https://docs.capeprivacy.com/reference/user-tokens). Technically this introduces a feature regression, since PATs give access to a user's entire set of deployed functions. A future update will allow PATs to be scoped to only authenticate run requests for specific functions, which will bring back parity with the function token approach.

What's Changed

* bump cryptography to resolve security alert (117) jvmncs
* bump dependencies, resolving some dependabot warnings (116) jvmncs
* fix docsite logo and missing cape_encrypt api ref (114) jvmncs
* refactor pycape api to use PATs, not fn tokens (113) jvmncs
* small fix to Cape.key response handler (112) jvmncs

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 4.9

CVSS v3 Details

MEDIUM 4.9
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
HIGH
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
NONE
Availability Availability (A)
HIGH