Untrusted Search Path Affecting poetry-core package, versions [,1.1.0a7)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-POETRYCORE-3018923
  • published8 Sept 2022
  • disclosed8 Sept 2022
  • creditUnknown

Introduced: 8 Sep 2022

CVE-2022-36070  (opens in a new tab)
CWE-426  (opens in a new tab)

How to fix?

Upgrade poetry-core to version 1.1.0a7 or higher.

Overview

poetry-core is a Poetry PEP 517 Build Backend

Affected versions of this package are vulnerable to Untrusted Search Path when using git commands for the executable’s name and not its absolute path. Exploiting this vulnerability is possible because the method Windows resolves executable names to paths. Unlike Linux-based operating systems, Windows searches for the executable in the current directory first and looks in the paths that are defined in the PATH environment variable afterward. If the current directory contains unknown and thus potentially malicious files, the directory could contain an executable named git.exe which would be executed by Poetry.

CVSS Scores

version 3.1