PyPi: Nemo

CVE-2023-31047

Transitive

Safety vulnerability ID: 58706

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 07, 2023 Updated at Nov 29, 2024
Scan your Python projects for vulnerabilities →

Advisory

Nemo 4.5.5 updates its dependency 'django' to v3.2.19 to include a security fix.

Affected package

nemo

Latest version: 6.0.3

NEMO is a laboratory logistics web application. Use it to schedule reservations, control tool access, track maintenance issues, and more.

Affected versions

Fixed versions

Vulnerability changelog

Bug fixes
- Fixed trying to increment tool counter when forcing someone off a tool
- Fixed issue when trying to disable a tool and a interlock error happens ("disable anyway" was not working)
- Fixed issue when user office staff members are not able to force a user off a tool
- Fixed issue with post usage questions not showing as empty when they should be
- Fixed issue when using mocked request (in emails) and the full url method was not working
- Fixed issue with related fields not being read correctly when using CSV api import
- Fixed adjustment request breaking when the user is staff and has an ongoing staff charge
- Fixed already adjustment charge still showing in my usage and in dropdown when creating new adjustment request
- Fixed issue when deleting sensors in detailed admin and there is too much data and the system times out

Improvements
- Added customization to show an "edit charge" button in approved adjustment requests

Libraries
- Django 3.2.18 -> 3.2.19 (vulnerability)

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

CRITICAL 9.8

CVSS v3 Details

CRITICAL 9.8
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
HIGH