gramps-webapi@3.1.0

A RESTful web API for the Gramps genealogical database.

  • latest version

    3.13.0

  • latest non vulnerable version

  • first published

    4 years ago

  • latest version published

    8 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the gramps-webapi package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Directory Traversal

    gramps-webapi is an A RESTful web API for the Gramps genealogical database.

    Affected versions of this package are vulnerable to Directory Traversal via the MediaImporter._check_disk_space_and_extract function. An attacker can write arbitrary files outside the intended extraction directory by uploading a specially crafted ZIP archive containing directory traversal sequences. This can lead to overwriting critical files or corrupting data on the server's filesystem. This is only exploitable if the attacker has owner-level privileges and uploads a malicious ZIP archive.

    How to fix Directory Traversal?

    Upgrade gramps-webapi to version 3.11.1 or higher.

    [1.6.0,3.11.1)
    • M
    Information Exposure

    gramps-webapi is an A RESTful web API for the Gramps genealogical database.

    Affected versions of this package are vulnerable to Information Exposure in the iter_*() process. An attacker can access private sub-object data attached to otherwise-public objects by querying list API endpoints as a user with the Guest role. This is only exploitable if sub-objects have been explicitly marked private in the desktop application and then synced or imported into the web application.

    How to fix Information Exposure?

    Upgrade gramps-webapi to version 3.11.0 or higher.

    [,3.11.0)