Vulnerability Description
In Autoswitch Python Virtualenv before version 0.16.0, a user who enters a directory with a malicious `.venv` file could run arbitrary code without any user interaction. This is fixed in version: 1.16.0
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Autoswitch Python Virtualenv Project | Autoswitch Python Virtualenv | < 1.16.0 |
Related Weaknesses (CWE)
References
- https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/commit/30c77db7c83ePatchThird Party Advisory
- https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/issues/122ExploitThird Party Advisory
- https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/pull/123Third Party Advisory
- https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/security/advisoriesThird Party Advisory
- https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/commit/30c77db7c83ePatchThird Party Advisory
- https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/issues/122ExploitThird Party Advisory
- https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/pull/123Third Party Advisory
- https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/security/advisoriesThird Party Advisory
FAQ
What is CVE-2020-11073?
CVE-2020-11073 is a vulnerability with a CVSS score of 7.9 (HIGH). In Autoswitch Python Virtualenv before version 0.16.0, a user who enters a directory with a malicious `.venv` file could run arbitrary code without any user interaction. This is fixed in version: 1.16...
How severe is CVE-2020-11073?
CVE-2020-11073 has been rated HIGH with a CVSS base score of 7.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-11073?
Check the references section above for vendor advisories and patch information. Affected products include: Autoswitch Python Virtualenv Project Autoswitch Python Virtualenv.