Arbitrary Command Injection Affecting pymatgen package, versions <2024.1.27+dfsg1-6


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
32.05% (97th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-PYMATGEN-6264781
  • published23 Feb 2024
  • disclosed21 Feb 2024

Introduced: 21 Feb 2024

CVE-2024-23346  (opens in a new tab)
CWE-77  (opens in a new tab)

How to fix?

Upgrade Debian:unstable pymatgen to version 2024.1.27+dfsg1-6 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream pymatgen package and not the pymatgen package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Pymatgen (Python Materials Genomics) is an open-source Python library for materials analysis. A critical security vulnerability exists in the JonesFaithfulTransformation.from_transformation_str() method within the pymatgen library prior to version 2024.2.20. This method insecurely utilizes eval() for processing input, enabling execution of arbitrary code when parsing untrusted input. Version 2024.2.20 fixes this issue.

CVSS Base Scores

version 3.1