Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-35932

Опубликовано: 23 июн. 2023
Источник: nvd
CVSS3: 7.1
CVSS3: 8.8
EPSS Низкий

Описание

jcvi is a Python library to facilitate genome assembly, annotation, and comparative genomics. A configuration injection happens when user input is considered by the application in an unsanitized format and can reach the configuration file. A malicious user may craft a special payload that may lead to a command injection. The impact of a configuration injection may vary. Under some conditions, it may lead to command injection if there is for instance shell code execution from the configuration file values. This vulnerability does not currently have a fix.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:jcvi_project:jcvi:*:*:*:*:*:*:*:*
Версия до 1.3.5 (включая)

EPSS

Процентиль: 74%
0.00843
Низкий

7.1 High

CVSS3

8.8 High

CVSS3

Дефекты

CWE-77
CWE-1284

Связанные уязвимости

CVSS3: 7.1
github
больше 2 лет назад

jcvi vulnerable to Configuration Injection due to unsanitized user input

EPSS

Процентиль: 74%
0.00843
Низкий

7.1 High

CVSS3

8.8 High

CVSS3

Дефекты

CWE-77
CWE-1284