PyPi: Scancodeio

CVE-2023-39523

Safety vulnerability ID: 60251

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Aug 07, 2023 Updated at Jul 02, 2024
Scan your Python projects for vulnerabilities →

Advisory

Scancodeio 32.5.1 includes a fix for a Command Injection vulnerability in the fetch process of the Docker image.
https://github.com/nexB/scancode.io/security/advisories/GHSA-2ggp-cmvm-f62f

Affected package

scancodeio

Latest version: 34.7.0

Automate software composition analysis pipelines

Affected versions

Fixed versions

Vulnerability changelog

--------------------

Security release: This release addresses the security issue detailed below.
We encourage all users of ScanCode.io to upgrade as soon as possible.

- GHSA-2ggp-cmvm-f62f: Command injection in docker image fetch process
The ``fetch_docker_image`` function was subject to potential injection attack.
The user inputs are now sanitized before calling the subprocess function.
https://github.com/nexB/scancode.io/security/advisories/GHSA-2ggp-cmvm-f62f

---

- Add support for multiple input URLs, and adding multiple pipelines in the project
creation REST API.
https://github.com/nexB/scancode.io/issues/828

- Update the ``fetch_vulnerabilities`` pipe to make the API requests by batch of purls.
https://github.com/nexB/scancode.io/issues/835

- Add vulnerability support for discovered dependencies.
The dependency data is loaded using the ``find_vulnerabilities`` pipeline backed by
a VulnerableCode database.
https://github.com/nexB/scancode.io/issues/835

- Fix root filesystem scanning for installed packages and archived Linux distributions.
Allows the scan to discover system packages from `rpmdb.sqlite` and other sources.
https://github.com/nexB/scancode.io/pull/840

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 8.8

CVSS v3 Details

HIGH 8.8
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
LOW
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
HIGH