Vulnerability Description
This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gerapy | Gerapy | >= 0.0.0, < 0.9.3 |
Related Weaknesses (CWE)
References
- https://github.com/Gerapy/Gerapy/commit/e8446605eb2424717418eae199ec7aad573da2d2PatchThird Party Advisory
- https://snyk.io/vuln/SNYK-PYTHON-GERAPY-572470PatchThird Party Advisory
- https://github.com/Gerapy/Gerapy/commit/e8446605eb2424717418eae199ec7aad573da2d2PatchThird Party Advisory
- https://snyk.io/vuln/SNYK-PYTHON-GERAPY-572470PatchThird Party Advisory
FAQ
What is CVE-2020-7698?
CVE-2020-7698 is a vulnerability with a CVSS score of 8.1 (HIGH). This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized.
How severe is CVE-2020-7698?
CVE-2020-7698 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-7698?
Check the references section above for vendor advisories and patch information. Affected products include: Gerapy Gerapy.