prefect@3.0.0rc3 vulnerabilities

Workflow orchestration and management.

Direct Vulnerabilities

Known vulnerabilities in the prefect package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Server-side Request Forgery (SSRF)

prefect is a Prefect is a new workflow management system, designed for modern infrastructure and powered by the open-source Prefect Core workflow engine. Users organize Tasks into Flows, and Prefect takes care of the rest.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) when Prefect API is exposed to "external" users of any kind. An attacker can maliciously craft a notification URL that points to an internal API, resulting in potential information exposure, access to internal services, and private IP addresses.

How to fix Server-side Request Forgery (SSRF)?

Upgrade prefect to version 2.20.11, 3.0.2 or higher.

[,2.20.11) [3.0.0rc1,3.0.2)
  • H
Race Condition

prefect is a Prefect is a new workflow management system, designed for modern infrastructure and powered by the open-source Prefect Core workflow engine. Users organize Tasks into Flows, and Prefect takes care of the rest.

Affected versions of this package are vulnerable to Race Condition that could lead to operational inconsistencies and potential security vulnerabilities. This issue arises when multiple processes attempt to update the state of the same flow run concurrently, leading to conflicts such as duplicate flow run executions.

How to fix Race Condition?

Upgrade prefect to version 3.0.0rc4 or higher.

[3.0.0rc2,3.0.0rc4)