Arbitrary Code Execution Affecting knowledge-repo package, versions [,0.8.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-KNOWLEDGEREPO-72646
  • published28 Nov 2018
  • disclosed1 Nov 2018
  • creditUnknown

Introduced: 1 Nov 2018

CVE NOT AVAILABLE CWE-94  (opens in a new tab)

How to fix?

Upgrade knowledge-repo to version 0.8.0 or higher.

Overview

knowledge-repo is focused on facilitating the sharing of knowledge between data scientists and other technical roles using data formats and tools that make sense in these professions.

Affected versions of this package are vulnerable to Arbitrary Code Execution. knowledge-repo read their configuration from the repository itself, by default from a python module called knowledge_repo_config.py. A malicious user with appropriate permissions could submit arbitrary code that will be executed at runtime on users’ machines, potentially leading to unwanted data loss, corruption or dissemination. With this change, only YAML configuration files will be read from the repository, mitigating this security vulnerability.

CVSS Base Scores

version 3.1