Описание
The package cookiecutter before 2.1.1 are vulnerable to Command Injection via hg argument injection. When calling the cookiecutter function from Python code with the checkout parameter, it is passed to the hg checkout command in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| cookiecutter | fixed | 2.6.0-1 | package | |
| cookiecutter | no-dsa | bookworm | package | |
| cookiecutter | no-dsa | bullseye | package | |
| cookiecutter | no-dsa | buster | package | |
| cookiecutter | no-dsa | stretch | package |
Примечания
https://security.snyk.io/vuln/SNYK-PYTHON-COOKIECUTTER-2414281
https://github.com/cookiecutter/cookiecutter/releases/tag/2.1.1
https://github.com/cookiecutter/cookiecutter/commit/fdffddb31fd2b46344dfa317531ff155e7999f77
Связанные уязвимости
The package cookiecutter before 2.1.1 are vulnerable to Command Injection via hg argument injection. When calling the cookiecutter function from Python code with the checkout parameter, it is passed to the hg checkout command in a way that additional flags can be set. The additional flags can be used to perform a command injection.
The package cookiecutter before 2.1.1 are vulnerable to Command Injection via hg argument injection. When calling the cookiecutter function from Python code with the checkout parameter, it is passed to the hg checkout command in a way that additional flags can be set. The additional flags can be used to perform a command injection.