Improper Control of Generation of Code ('Code Injection') Affecting ait-core package, versions [0,]
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-AITCORE-6969134
- published 22 May 2024
- disclosed 21 May 2024
- credit Andy Olchawa, Milenko Starcik
Introduced: 21 May 2024
CVE-2024-35057 Open this link in a new tabHow to fix?
There is no fixed version for ait-core
.
Overview
ait-core is a NASA JPL's Ground Data System toolkit for Instrument and CubeSat Missions
Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') via a crafted packet. An attacker can execute arbitrary code by sending a maliciously crafted packet to the server.
Note: Although the eval function is handy, it is inherently insecure. It is recommended to use third-party libraries that provide the same functionality but sanitise the input to handle expression evaluation securely.